[
  {
    "SuitePath": "/tmp/tmp.QShu3Ly5GU/cmd",
    "SuiteDescription": "Red Hat App Studio E2E tests",
    "SuiteLabels": [],
    "SuiteSemVerConstraints": [],
    "SuiteSucceeded": false,
    "SuiteHasProgrammaticFocus": false,
    "SpecialSuiteFailureReasons": [],
    "PreRunStats": {
      "TotalSpecs": 477,
      "SpecsThatWillRun": 137
    },
    "StartTime": "2026-04-20T17:29:40.555622513Z",
    "EndTime": "2026-04-20T17:49:58.94373704Z",
    "RunTime": 1218388114527,
    "SuiteConfig": {
      "RandomSeed": 1776704753,
      "RandomizeAllSpecs": false,
      "FocusStrings": null,
      "SkipStrings": null,
      "FocusFiles": [
        "tests/integration-service/forgejo-integration-reporting.go",
        "tests/integration-service/gitlab-integration-reporting.go",
        "tests/integration-service/group-snapshots-tests.go",
        "tests/integration-service/integration.go",
        "tests/integration-service/status-reporting-to-pullrequest.go"
      ],
      "SkipFiles": null,
      "LabelFilter": "",
      "SemVerFilter": "",
      "FailOnPending": false,
      "FailOnEmpty": false,
      "FailFast": false,
      "FlakeAttempts": 0,
      "MustPassRepeatedly": 0,
      "DryRun": false,
      "PollProgressAfter": 0,
      "PollProgressInterval": 0,
      "Timeout": 5247871636843,
      "EmitSpecProgress": false,
      "OutputInterceptorMode": "none",
      "SourceRoots": null,
      "GracePeriod": 30000000000,
      "ParallelProcess": 1,
      "ParallelTotal": 20,
      "ParallelHost": "127.0.0.1:38135"
    },
    "SpecReports": [
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with happy path for general flow of Integration service",
          "when a new Component is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 51
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 84
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 85
        },
        "LeafNodeLabels": [
          "integration-service"
        ],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "triggers a build PipelineRun",
        "State": "failed",
        "StartTime": "2026-04-20T17:29:41.061760787Z",
        "EndTime": "2026-04-20T17:49:56.816254732Z",
        "RunTime": 1215754493915,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Unexpected error:\n    \u003ccontext.deadlineExceededError\u003e: \n    context deadline exceeded\n    {}\noccurred",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 87,
            "FullStackTrace": "github.com/konflux-ci/e2e-tests/tests/integration-service.init.func4.1.3.1()\n\t/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go:87 +0xe3"
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 5,
            "Time": "2026-04-20T17:49:55.923082111Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 85
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 1,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0,
        "CapturedGinkgoWriterOutput": "no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)no pipelinerun found for component test-component-pac-fholld (application: integ-app-kbcq, namespace: integration1-jszo)",
        "SpecEvents": [
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
              "LineNumber": 52
            },
            "TimelineLocation": {
              "Order": 1,
              "Time": "2026-04-20T17:29:41.062165918Z"
            },
            "Message": "with happy path for general flow of Integration service",
            "NodeType": "BeforeAll"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
              "LineNumber": 52
            },
            "TimelineLocation": {
              "Order": 3,
              "Time": "2026-04-20T17:29:55.921559497Z"
            },
            "Message": "with happy path for general flow of Integration service",
            "Duration": 14859393589,
            "NodeType": "BeforeAll"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
              "LineNumber": 85
            },
            "TimelineLocation": {
              "Order": 4,
              "Time": "2026-04-20T17:29:55.921764933Z"
            },
            "Message": "triggers a build PipelineRun",
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
              "LineNumber": 85
            },
            "TimelineLocation": {
              "Offset": 7200,
              "Order": 6,
              "Time": "2026-04-20T17:49:55.923103392Z"
            },
            "Message": "triggers a build PipelineRun",
            "Duration": 1200001338489,
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
              "LineNumber": 68
            },
            "TimelineLocation": {
              "Offset": 7200,
              "Order": 7,
              "Time": "2026-04-20T17:49:55.923371628Z"
            },
            "Message": "with happy path for general flow of Integration service",
            "NodeType": "AfterAll"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
              "LineNumber": 68
            },
            "TimelineLocation": {
              "Offset": 7200,
              "Order": 9,
              "Time": "2026-04-20T17:49:56.718696638Z"
            },
            "Message": "with happy path for general flow of Integration service",
            "Duration": 795325009,
            "NodeType": "AfterAll"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
              "LineNumber": 49
            },
            "TimelineLocation": {
              "Offset": 7200,
              "Order": 10,
              "Time": "2026-04-20T17:49:56.718895823Z"
            },
            "Message": "[integration-service-suite Integration Service E2E tests]",
            "NodeType": "AfterEach"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
              "LineNumber": 49
            },
            "TimelineLocation": {
              "Offset": 7200,
              "Order": 12,
              "Time": "2026-04-20T17:49:56.816246672Z"
            },
            "Message": "[integration-service-suite Integration Service E2E tests]",
            "Duration": 97350839,
            "NodeType": "AfterEach"
          }
        ]
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with happy path for general flow of Integration service",
          "when a new Component is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 51
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 84
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 90
        },
        "LeafNodeLabels": [
          "integration-service"
        ],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "verifies if the build PipelineRun contains the finalizer",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.817228087Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 90
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 13,
            "Time": "2026-04-20T17:49:56.817223107Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 90
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with happy path for general flow of Integration service",
          "when a new Component is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 51
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 84
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 101
        },
        "LeafNodeLabels": [
          "integration-service"
        ],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "waits for build PipelineRun to succeed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.817501134Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 101
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 14,
            "Time": "2026-04-20T17:49:56.817500164Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 101
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with happy path for general flow of Integration service",
          "when a new Component is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 51
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 84
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 107
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should have a related PaC init PR created",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.81773401Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 107
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 15,
            "Time": "2026-04-20T17:49:56.81773285Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 107
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with happy path for general flow of Integration service",
          "when the build pipelineRun run succeeded"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 51
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 127
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 128
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if the BuildPipelineRun have the annotation of chains signed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.817927035Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 128
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 16,
            "Time": "2026-04-20T17:49:56.817926045Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 128
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with happy path for general flow of Integration service",
          "when the build pipelineRun run succeeded"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 51
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 127
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 132
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if the Snapshot is created",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.81813785Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 132
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 17,
            "Time": "2026-04-20T17:49:56.81813682Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 132
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with happy path for general flow of Integration service",
          "when the build pipelineRun run succeeded"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 51
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 127
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 137
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if the Build PipelineRun got annotated with Snapshot name",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.818308114Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 137
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 18,
            "Time": "2026-04-20T17:49:56.818307294Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 137
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with happy path for general flow of Integration service",
          "when the build pipelineRun run succeeded"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 51
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 127
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 141
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "verifies that the finalizer has been removed from the build pipelinerun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.818463188Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 141
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 19,
            "Time": "2026-04-20T17:49:56.818462188Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 141
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with happy path for general flow of Integration service",
          "when the build pipelineRun run succeeded"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 51
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 127
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 154
        },
        "LeafNodeLabels": [
          "slow"
        ],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if all of the integrationPipelineRuns passed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.818627262Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 154
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 20,
            "Time": "2026-04-20T17:49:56.818626242Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 154
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with happy path for general flow of Integration service",
          "when the build pipelineRun run succeeded"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 51
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 127
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 158
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if the passed status of integration test is reported in the Snapshot",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.818780766Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 158
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 21,
            "Time": "2026-04-20T17:49:56.818779946Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 158
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with happy path for general flow of Integration service",
          "when the build pipelineRun run succeeded"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 51
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 127
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 173
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if the skipped integration test is absent from the Snapshot's status annotation",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.818956291Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 173
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 22,
            "Time": "2026-04-20T17:49:56.818955561Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 173
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with happy path for general flow of Integration service",
          "when the build pipelineRun run succeeded"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 51
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 127
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 183
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if the finalizer was removed from all of the related Integration pipelineRuns",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.819126075Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 183
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 23,
            "Time": "2026-04-20T17:49:56.819125395Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 183
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with happy path for general flow of Integration service"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 51
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 188
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "creates a ReleasePlan",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.819284819Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 188
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 24,
            "Time": "2026-04-20T17:49:56.819284009Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 188
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with happy path for general flow of Integration service"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 51
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 198
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "creates an snapshot of push event",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.819436993Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 198
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 25,
            "Time": "2026-04-20T17:49:56.819436213Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 198
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with happy path for general flow of Integration service",
          "when An snapshot of push event is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 51
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 204
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 205
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if the global candidate is updated after push event",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.819591607Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 205
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 26,
            "Time": "2026-04-20T17:49:56.819590817Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 205
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with happy path for general flow of Integration service",
          "when An snapshot of push event is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 51
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 204
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 218
        },
        "LeafNodeLabels": [
          "slow"
        ],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if all of the integrationPipelineRuns created by push event passed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.819760641Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 218
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 27,
            "Time": "2026-04-20T17:49:56.819759641Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 218
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with happy path for general flow of Integration service",
          "when An snapshot of push event is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 51
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 204
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 222
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if a Release is created successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.819917335Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 222
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 28,
            "Time": "2026-04-20T17:49:56.819916355Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 222
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 266
        },
        "LeafNodeLabels": [
          "integration-service"
        ],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "triggers a build PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.82010888Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 266
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 29,
            "Time": "2026-04-20T17:49:56.82010646Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 266
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 273
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should have a related PaC init PR created",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.820260474Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 273
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 30,
            "Time": "2026-04-20T17:49:56.820259714Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 273
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 292
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if the BuildPipelineRun have the annotation of chains signed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.820412148Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 292
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 31,
            "Time": "2026-04-20T17:49:56.820411218Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 292
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 296
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if the Snapshot is created",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.820560082Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 296
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 32,
            "Time": "2026-04-20T17:49:56.820559022Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 296
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 301
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if the Build PipelineRun got annotated with Snapshot name",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.820714906Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 301
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 33,
            "Time": "2026-04-20T17:49:56.820714106Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 301
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 305
        },
        "LeafNodeLabels": [
          "slow"
        ],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if all of the integrationPipelineRuns finished",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.820862769Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 305
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 34,
            "Time": "2026-04-20T17:49:56.820862029Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 305
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 309
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if the failed status of integration test is reported in the Snapshot",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.821054044Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 309
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 35,
            "Time": "2026-04-20T17:49:56.821052874Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 309
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 324
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if the skipped integration test is absent from the Snapshot's status annotation",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.821212138Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 324
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 36,
            "Time": "2026-04-20T17:49:56.821211288Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 324
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 334
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if snapshot is marked as failed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.821357072Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 334
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 37,
            "Time": "2026-04-20T17:49:56.821356332Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 334
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 3,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 340
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if the finalizer was removed from all of the related Integration pipelineRuns",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.821513246Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 340
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 38,
            "Time": "2026-04-20T17:49:56.821512426Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 340
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 344
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "creates a new IntegrationTestScenario",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.82165914Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 344
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 39,
            "Time": "2026-04-20T17:49:56.82165832Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 344
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 349
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "updates the Snapshot with the re-run label for the new scenario",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.821810143Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 349
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 40,
            "Time": "2026-04-20T17:49:56.821809363Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 349
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 3,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail",
          "when An snapshot is updated with a re-run label for a given scenario"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 357
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 358
        },
        "LeafNodeLabels": [
          "slow"
        ],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if the new integration pipelineRun started",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.821981208Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 358
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 41,
            "Time": "2026-04-20T17:49:56.821980428Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 358
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail",
          "when An snapshot is updated with a re-run label for a given scenario"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 357
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 364
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if the re-run label was removed from the Snapshot",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.822146132Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 364
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 42,
            "Time": "2026-04-20T17:49:56.822145302Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 364
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail",
          "when An snapshot is updated with a re-run label for a given scenario"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 357
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 378
        },
        "LeafNodeLabels": [
          "slow"
        ],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if all integration pipelineRuns finished successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.822295296Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 378
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 43,
            "Time": "2026-04-20T17:49:56.822294536Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 378
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail",
          "when An snapshot is updated with a re-run label for a given scenario"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 357
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 382
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if the name of the re-triggered pipelinerun is reported in the Snapshot",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.82244532Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 382
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 44,
            "Time": "2026-04-20T17:49:56.82244457Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 382
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 3,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail",
          "when An snapshot is updated with a re-run label for a given scenario"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 357
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 399
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks if snapshot is still marked as failed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.822591213Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 399
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 45,
            "Time": "2026-04-20T17:49:56.822590223Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 399
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 406
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "creates an snapshot of push event",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.822747927Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 406
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 46,
            "Time": "2026-04-20T17:49:56.822747157Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 406
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Integration Service E2E tests]",
          "with an integration test fail",
          "when An snapshot of push event is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 233
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 412
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service"
          ],
          [],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
          "LineNumber": 413
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "checks no Release CRs are created",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:56.822891911Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 413
          },
          "TimelineLocation": {
            "Offset": 7200,
            "Order": 47,
            "Time": "2026-04-20T17:49:56.822891221Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/integration.go",
            "LineNumber": 413
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Same-Version Backup/Restore]",
          "when creating tenants and running initial pipelines"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
            "LineNumber": 42
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
          "LineNumber": 43
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should create both tenants concurrently",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.941068202Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Same-Version Backup/Restore]",
          "when creating tenants and running initial pipelines"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
            "LineNumber": 42
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
          "LineNumber": 56
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should wait for all build PipelineRuns to succeed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.941353019Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Same-Version Backup/Restore]",
          "when backing up tenant data"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
            "LineNumber": 62
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
          "LineNumber": 63
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should create backup CRs for both tenants concurrently",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.941526284Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Same-Version Backup/Restore]",
          "when simulating disaster by deleting namespaces"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
            "LineNumber": 78
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
          "LineNumber": 79
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should delete both tenant namespaces",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.941662437Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Same-Version Backup/Restore]",
          "when restoring from backup"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
            "LineNumber": 87
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
          "LineNumber": 88
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should restore tenant-1 (KokoHazamar) via velero CLI method",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.94178898Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Same-Version Backup/Restore]",
          "when restoring from backup"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
            "LineNumber": 87
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
          "LineNumber": 92
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should restore tenant-2 (MosheKipod) via oc command method",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.941915564Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Same-Version Backup/Restore]",
          "when performing post-restore recovery"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
            "LineNumber": 98
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
          "LineNumber": 99
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should rotate SA tokens on both tenants",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.942060317Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Same-Version Backup/Restore]",
          "when verifying restored tenants"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
            "LineNumber": 107
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
          "LineNumber": 108
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should confirm structural integrity of both tenants",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.942189211Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Same-Version Backup/Restore]",
          "when verifying restored tenants"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
            "LineNumber": 107
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_same_version.go",
          "LineNumber": 114
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should confirm functional pipeline execution after restore",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.942310634Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Backwards-Compat]",
          "when creating tenants on the old Konflux version"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
            "LineNumber": 56
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
          "LineNumber": 57
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should create both tenants concurrently",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.942438687Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Backwards-Compat]",
          "when creating tenants on the old Konflux version"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
            "LineNumber": 56
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
          "LineNumber": 70
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should wait for all build PipelineRuns to succeed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.9425656Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Backwards-Compat]",
          "when backing up tenant data before upgrade"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
            "LineNumber": 76
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
          "LineNumber": 77
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should create backup CRs for both tenants concurrently",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.942683293Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Backwards-Compat]",
          "when simulating disaster by deleting namespaces"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
            "LineNumber": 92
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
          "LineNumber": 93
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should delete both tenant namespaces",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.942807086Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Backwards-Compat]",
          "when upgrading Konflux to the new version"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
            "LineNumber": 104
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
          "LineNumber": 105
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should upgrade the cluster and verify Velero survived",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.942921769Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Backwards-Compat]",
          "when restoring tenants from backup on the new Konflux version"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
            "LineNumber": 111
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
          "LineNumber": 112
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should restore tenant-1 (KokoHazamar) via velero CLI method",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.943068783Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Backwards-Compat]",
          "when restoring tenants from backup on the new Konflux version"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
            "LineNumber": 111
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
          "LineNumber": 116
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should restore tenant-2 (MosheKipod) via oc command method",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.943191196Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Backwards-Compat]",
          "when performing post-restore recovery"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
            "LineNumber": 122
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
          "LineNumber": 123
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should rotate SA tokens on both tenants",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.943319739Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Backwards-Compat]",
          "when verifying restored tenants"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
            "LineNumber": 131
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
          "LineNumber": 132
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should confirm structural integrity of both tenants",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.943432062Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[disaster-recovery DR Backwards-Compat]",
          "when verifying restored tenants"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 53
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
            "LineNumber": 131
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "disaster-recovery",
            "Serial"
          ],
          []
        ],
        "ContainerHierarchySemVerConstraints": [
          [],
          []
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/disaster-recovery/dr_backwards_compat.go",
          "LineNumber": 138
        },
        "LeafNodeLabels": [],
        "LeafNodeSemVerConstraints": [],
        "LeafNodeText": "should confirm functional pipeline execution after restore",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.943547275Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 1,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "gitlab"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 235
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates component with nudges",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.057185806Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 17,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "gitlab"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 259
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers a PipelineRun for parent component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.059172408Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 17,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "gitlab"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 274
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "the PipelineRun should eventually finish successfully for parent component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.060028681Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 17,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "gitlab"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 285
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "the PipelineRun should eventually finish successfully for child component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.060643727Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 17,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "gitlab"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 289
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a PaC PR creation for child component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.061081599Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 17,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "gitlab"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 307
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "Merging the PaC PR should be successful for child component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.061451539Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 17,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "gitlab"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 318
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "create dockerfile and yaml manifest that references build and distribution repositories",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.061691995Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 17,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "gitlab"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 358
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a PaC PR creation for parent component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.061925811Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 17,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "gitlab"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 375
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "Merging the PaC PR should be successful for parent component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.062299741Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 17,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "gitlab"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 385
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "PR merge triggers PAC PipelineRun for parent component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.062568968Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 17,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "gitlab"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 401
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "PAC PipelineRun for parent component  is successful",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.063071852Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 17,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "gitlab"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 412
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a nudge PR creation for child component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.157236709Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 17,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "gitlab"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 429
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "merging the PR should be successful for child component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.15800839Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 17,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "gitlab"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 440
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "Verify the nudge updated the contents",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.158300887Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 17,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[upgrade-suite Create users and check their state]"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 37
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "upgrade-verify"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/upgrade/verifyWorkload.go",
          "LineNumber": 20
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "Verify AppStudioProvisionedUser",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.157596229Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 11,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[upgrade-suite Create users and check their state]"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 37
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "upgrade-verify"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/upgrade/verifyWorkload.go",
          "LineNumber": 24
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates AppStudioDeactivatedUser",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.158244366Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 11,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[upgrade-suite Create users and check their state]"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 37
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "upgrade-verify"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/upgrade/verifyWorkload.go",
          "LineNumber": 28
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates AppStudioBannedUser",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.158543804Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 11,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 189
        },
        "LeafNodeLabels": [
          "konflux",
          "upstream-konflux"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates an application",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.8601607Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 202
        },
        "LeafNodeLabels": [
          "konflux",
          "upstream-konflux"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates an IntegrationTestScenario for the app",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.86054184Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 218
        },
        "LeafNodeLabels": [
          "konflux",
          "upstream-konflux"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates new branch for the build",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.055607494Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 233
        },
        "LeafNodeLabels": [
          "konflux",
          "upstream-konflux"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates component konflux-demo-component (private: false) from git source https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.056156158Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build",
          "when Component is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 258
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null,
          [
            "upstream-konflux"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 259
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers creation of a PR in the sample repo",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.056455456Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build",
          "when Component is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 258
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null,
          [
            "upstream-konflux"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 297
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies component build status",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.056766425Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build",
          "when Component is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 258
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null,
          [
            "upstream-konflux"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 335
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should eventually lead to triggering a 'push' event type PipelineRun after merging the PaC init branch ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.057203646Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build",
          "when Build PipelineRun is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 368
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null,
          [
            "upstream-konflux"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 369
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "does not contain an annotation with a Snapshot Name",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.059069395Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build",
          "when Build PipelineRun is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 368
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null,
          [
            "upstream-konflux"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 373
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should eventually complete successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.059905548Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build",
          "when Build PipelineRun completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 387
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 389
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should validate Tekton TaskRun test results successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.060633817Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build",
          "when Build PipelineRun completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 387
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 403
        },
        "LeafNodeLabels": [
          "upstream-konflux"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should validate that the build pipelineRun is signed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.061157911Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build",
          "when Build PipelineRun completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 387
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 419
        },
        "LeafNodeLabels": [
          "upstream-konflux"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should find the related Snapshot CR",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.061578412Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build",
          "when Build PipelineRun completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 387
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 432
        },
        "LeafNodeLabels": [
          "upstream-konflux"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should validate that the build pipelineRun is annotated with the name of the Snapshot",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.061846959Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build",
          "when Build PipelineRun completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 387
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 441
        },
        "LeafNodeLabels": [
          "upstream-konflux"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should find the related Integration Test PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.062130767Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build",
          "when push pipelinerun is retriggered"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 461
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 462
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should eventually succeed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.062428805Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build",
          "when Integration Test PipelineRun is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 492
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null,
          [
            "upstream-konflux"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 493
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should eventually complete successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.062726203Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build",
          "when Integration Test PipelineRun completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 504
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null,
          [
            "upstream-konflux"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 505
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to Snapshot CR being marked as passed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.063122823Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build",
          "when Integration Test PipelineRun completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 504
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null,
          [
            "upstream-konflux"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 518
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should trigger creation of Release CR",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.157698542Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build",
          "when Release CR is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 532
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null,
          [
            "upstream-konflux"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 533
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers creation of Release PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.15837972Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build",
          "when Release PipelineRun is triggered"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 551
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null,
          [
            "upstream-konflux"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 552
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should eventually succeed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.158610336Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[konflux-demo-suite]",
          "Maven project - Default build",
          "when Release PipelineRun is completed"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 83
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
            "LineNumber": 577
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "konflux"
          ],
          null,
          [
            "upstream-konflux"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/konflux-demo/konflux-demo.go",
          "LineNumber": 578
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to Release CR being marked as succeeded",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.158888533Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 8,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "aws host-pool allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 70
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 119
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "aws-host-pool"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 120
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "a PipelineRun is triggered",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:40.860248442Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "aws host-pool allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 70
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 119
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "aws-host-pool"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 124
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "the build-container task from component pipelinerun is buildah-remote",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:40.860593262Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "aws host-pool allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 70
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 119
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "aws-host-pool"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 127
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "The multi platform secret is populated",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:40.861078115Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "aws host-pool allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 70
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 119
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "aws-host-pool"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 148
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "that PipelineRun completes successfully",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:40.959808653Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "aws host-pool allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 70
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 119
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "aws-host-pool"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 152
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "test that cleanup happened successfully",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.055581873Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "aws dynamic allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 190
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 250
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "aws-dynamic"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 251
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "a PipelineRun is triggered",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.056288082Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "aws dynamic allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 190
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 250
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "aws-dynamic"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 255
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "the build-container task from component pipelinerun is buildah-remote",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.05661327Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "aws dynamic allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 190
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 250
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "aws-dynamic"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 259
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "The multi platform secret is populated",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.057158685Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "aws dynamic allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 190
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 250
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "aws-dynamic"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 263
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "that PipelineRun completes successfully",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.057465983Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "aws dynamic allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 190
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 250
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "aws-dynamic"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 267
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "check cleanup happened successfully",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.05885676Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "ibm system z dynamic allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 283
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 340
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "ibmz-dynamic"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 341
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "a PipelineRun is triggered",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.059164868Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "ibm system z dynamic allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 283
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 340
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "ibmz-dynamic"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 345
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "the build-container task from component pipelinerun is buildah-remote",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.059850376Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "ibm system z dynamic allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 283
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 340
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "ibmz-dynamic"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 349
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "The multi platform secret is populated",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.060536714Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "ibm system z dynamic allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 283
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 340
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "ibmz-dynamic"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 353
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "that PipelineRun completes successfully",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.060822902Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "ibm system z dynamic allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 283
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 340
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "ibmz-dynamic"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 357
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "check cleanup happened successfully",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.061167311Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "ibm power pc dynamic allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 373
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 431
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "ibmp-dynamic"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 432
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "a PipelineRun is triggered",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.061526621Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "ibm power pc dynamic allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 373
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 431
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "ibmp-dynamic"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 436
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "the build-container task from component pipelinerun is buildah-remote",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.06189229Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "ibm power pc dynamic allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 373
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 431
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "ibmp-dynamic"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 440
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "The multi platform secret is populated",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.062279401Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "ibm power pc dynamic allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 373
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 431
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "ibmp-dynamic"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 444
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "that PipelineRun completes successfully",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.062543388Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[multi-platform-build-service-suite Multi Platform Controller E2E tests]",
          "ibm power pc dynamic allocation",
          "when the Component with multi-platform-build is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 21
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 373
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
            "LineNumber": 431
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "multi-platform"
          ],
          [
            "ibmp-dynamic"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi-platform.go",
          "LineNumber": 448
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "check cleanup happened successfully",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.062814505Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 7,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite ReleasePlan and ReleasePlanAdmission match]",
          "RP and PRA status change verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
            "LineNumber": 56
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "release_plan_and_admission"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
          "LineNumber": 57
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that the ReleasePlan CR is unmatched in the beginning",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.857440748Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite ReleasePlan and ReleasePlanAdmission match]",
          "RP and PRA status change verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
            "LineNumber": 56
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "release_plan_and_admission"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
          "LineNumber": 72
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "Creates ReleasePlanAdmission CR in corresponding managed namespace",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.857749656Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite ReleasePlan and ReleasePlanAdmission match]",
          "RP and PRA status change verification",
          "when ReleasePlanAdmission CR is created in managed namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
            "LineNumber": 56
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
            "LineNumber": 84
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "release_plan_and_admission"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
          "LineNumber": 85
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that the ReleasePlan CR is set to matched",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.857975292Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite ReleasePlan and ReleasePlanAdmission match]",
          "RP and PRA status change verification",
          "when ReleasePlanAdmission CR is created in managed namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
            "LineNumber": 56
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
            "LineNumber": 84
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "release_plan_and_admission"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
          "LineNumber": 105
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that the ReleasePlanAdmission CR is set to matched",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.85827028Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite ReleasePlan and ReleasePlanAdmission match]",
          "RP and PRA status change verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
            "LineNumber": 56
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "release_plan_and_admission"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
          "LineNumber": 123
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "Creates a manual release ReleasePlan CR in devNamespace",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.862090041Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite ReleasePlan and ReleasePlanAdmission match]",
          "RP and PRA status change verification",
          "when the second ReleasePlan CR is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
            "LineNumber": 56
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
            "LineNumber": 128
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "release_plan_and_admission"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
          "LineNumber": 129
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that the second ReleasePlan CR is set to matched",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.956919946Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite ReleasePlan and ReleasePlanAdmission match]",
          "RP and PRA status change verification",
          "when the second ReleasePlan CR is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
            "LineNumber": 56
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
            "LineNumber": 128
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "release_plan_and_admission"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
          "LineNumber": 150
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that the ReleasePlanAdmission CR has two matched ReleasePlan CRs",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.959222858Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite ReleasePlan and ReleasePlanAdmission match]",
          "RP and PRA status change verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
            "LineNumber": 56
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "release_plan_and_admission"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
          "LineNumber": 171
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "deletes one ReleasePlan CR",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.959630718Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite ReleasePlan and ReleasePlanAdmission match]",
          "RP and PRA status change verification",
          "when One ReleasePlan CR is deleted in managed namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
            "LineNumber": 56
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
            "LineNumber": 176
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "release_plan_and_admission"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
          "LineNumber": 177
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that the ReleasePlanAdmission CR has only one matching ReleasePlan",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.959871095Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite ReleasePlan and ReleasePlanAdmission match]",
          "RP and PRA status change verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
            "LineNumber": 56
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "release_plan_and_admission"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
          "LineNumber": 198
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "deletes the ReleasePlanAdmission CR",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.96083726Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite ReleasePlan and ReleasePlanAdmission match]",
          "RP and PRA status change verification",
          "when ReleasePlanAdmission CR is deleted in managed namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
            "LineNumber": 56
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
            "LineNumber": 203
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "release_plan_and_admission"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/release_plan_and_admission_matched.go",
          "LineNumber": 204
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that the ReleasePlan CR has no matched ReleasePlanAdmission",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.055687226Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "github"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 235
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates component with nudges",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.056784165Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "github"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 259
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers a PipelineRun for parent component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.057250097Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "github"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 274
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "the PipelineRun should eventually finish successfully for parent component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.058924502Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "github"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 285
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "the PipelineRun should eventually finish successfully for child component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.059328733Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "github"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 289
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a PaC PR creation for child component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.059801565Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "github"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 307
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "Merging the PaC PR should be successful for child component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.060580886Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "github"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 318
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "create dockerfile and yaml manifest that references build and distribution repositories",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.061090649Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "github"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 358
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a PaC PR creation for parent component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.061549781Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "github"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 375
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "Merging the PaC PR should be successful for parent component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.061824529Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "github"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 385
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "PR merge triggers PAC PipelineRun for parent component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.062172878Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "github"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 401
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "PAC PipelineRun for parent component  is successful",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.062496026Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "github"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 412
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a nudge PR creation for child component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.062795554Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "github"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 429
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "merging the PR should be successful for child component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.063031961Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "github"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 440
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "Verify the nudge updated the contents",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.157799894Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite Push to external registry]",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/push_to_external_registry.go",
            "LineNumber": 155
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "push-to-external-registry"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/push_to_external_registry.go",
          "LineNumber": 157
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that a Release CR should have been created in the dev namespace",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.158451482Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite Push to external registry]",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/push_to_external_registry.go",
            "LineNumber": 155
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "push-to-external-registry"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/push_to_external_registry.go",
          "LineNumber": 164
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that Release PipelineRun should eventually succeed",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.159334115Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite Push to external registry]",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/push_to_external_registry.go",
            "LineNumber": 155
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "push-to-external-registry"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/push_to_external_registry.go",
          "LineNumber": 168
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "tests if the image was pushed to quay",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.159693724Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite Push to external registry]",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/push_to_external_registry.go",
            "LineNumber": 155
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "push-to-external-registry"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/push_to_external_registry.go",
          "LineNumber": 175
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that a Release is marked as succeeded.",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.256543743Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 3,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline]",
          "Rh-push-to-redhat-io happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_registry_redhat_io.go",
            "LineNumber": 59
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_registry_redhat_io.go",
            "LineNumber": 107
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rh-push-to-registry-redhat-io"
          ],
          [
            "PushToRedhatIO"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_registry_redhat_io.go",
          "LineNumber": 108
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies if the release CR is created",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:40.958901349Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline]",
          "Rh-push-to-redhat-io happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_registry_redhat_io.go",
            "LineNumber": 59
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_registry_redhat_io.go",
            "LineNumber": 107
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rh-push-to-registry-redhat-io"
          ],
          [
            "PushToRedhatIO"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_registry_redhat_io.go",
          "LineNumber": 118
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies the rhio release pipelinerun is running and succeeds",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:40.959629738Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline]",
          "Rh-push-to-redhat-io happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_registry_redhat_io.go",
            "LineNumber": 59
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_registry_redhat_io.go",
            "LineNumber": 107
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rh-push-to-registry-redhat-io"
          ],
          [
            "PushToRedhatIO"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_registry_redhat_io.go",
          "LineNumber": 148
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies release CR completed and set succeeded.",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:40.960123241Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline]",
          "Rh-push-to-redhat-io happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_registry_redhat_io.go",
            "LineNumber": 59
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_registry_redhat_io.go",
            "LineNumber": 107
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rh-push-to-registry-redhat-io"
          ],
          [
            "PushToRedhatIO"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_registry_redhat_io.go",
          "LineNumber": 159
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies if the MR URL is valid",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:40.961020095Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "forgejo"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 235
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates component with nudges",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.057583186Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "forgejo"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 259
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers a PipelineRun for parent component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.059323022Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "forgejo"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 274
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "the PipelineRun should eventually finish successfully for parent component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.059818646Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "forgejo"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 285
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "the PipelineRun should eventually finish successfully for child component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.060100963Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "forgejo"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 289
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a PaC PR creation for child component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.060721509Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "forgejo"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 307
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "Merging the PaC PR should be successful for child component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.061175302Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "forgejo"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 318
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "create dockerfile and yaml manifest that references build and distribution repositories",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.061531811Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "forgejo"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 358
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a PaC PR creation for parent component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.06186604Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "forgejo"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 375
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "Merging the PaC PR should be successful for parent component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.06223249Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "forgejo"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 385
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "PR merge triggers PAC PipelineRun for parent component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.062572599Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "forgejo"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 401
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "PAC PipelineRun for parent component  is successful",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.062827825Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "forgejo"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 412
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a nudge PR creation for child component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.063526394Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "forgejo"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 429
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "merging the PR should be successful for child component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.1576215Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "component update with renovate",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
            "LineNumber": 233
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "renovate",
            "multi-component"
          ],
          [
            "forgejo"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/renovate.go",
          "LineNumber": 440
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "Verify the nudge updated the contents",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.158104152Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis]",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_external_registry.go",
            "LineNumber": 213
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rh-push-to-external-registry"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_external_registry.go",
          "LineNumber": 215
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "tests that Release CR is created for the Snapshot",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.158878653Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis]",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_external_registry.go",
            "LineNumber": 213
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rh-push-to-external-registry"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_external_registry.go",
          "LineNumber": 226
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies a release PipelineRun is started and succeeded in managed namespace",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.15916205Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis]",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_external_registry.go",
            "LineNumber": 213
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rh-push-to-external-registry"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_external_registry.go",
          "LineNumber": 233
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "validate the result of task create-pyxis-image contains image ids",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.159496789Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis]",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_external_registry.go",
            "LineNumber": 213
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rh-push-to-external-registry"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_external_registry.go",
          "LineNumber": 248
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "tests that Release CR has completed",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.256591694Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis]",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_external_registry.go",
            "LineNumber": 213
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rh-push-to-external-registry"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_push_to_external_registry.go",
          "LineNumber": 265
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "validates that imageIds from task create-pyxis-image exist in Pyxis.",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.256875602Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 6,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite Release service happy path]",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/happy_path.go",
            "LineNumber": 149
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "happy-path"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/happy_path.go",
          "LineNumber": 151
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that a Release CR should have been created in the dev namespace",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.057612587Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite Release service happy path]",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/happy_path.go",
            "LineNumber": 149
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "happy-path"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/happy_path.go",
          "LineNumber": 158
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that Release PipelineRun is triggered",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.059070586Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite Release service happy path]",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/happy_path.go",
            "LineNumber": 149
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "happy-path"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/happy_path.go",
          "LineNumber": 162
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that Enterprise Contract Task has succeeded in the Release PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.05999499Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite Release service happy path]",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/happy_path.go",
            "LineNumber": 149
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "happy-path"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/happy_path.go",
          "LineNumber": 174
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that a Release is marked as succeeded.",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.060585626Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite FBC e2e-tests]",
          "with FBC happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 88
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 122
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "fbc-release"
          ],
          [
            "fbcHappyPath"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
          "LineNumber": 123
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.061224013Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite FBC e2e-tests]",
          "with FBC happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 88
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 122
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "fbc-release"
          ],
          [
            "fbcHappyPath"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
          "LineNumber": 128
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "Creates a push snapshot for a release",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.061622823Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite FBC e2e-tests]",
          "with FBC happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 88
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 122
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "fbc-release"
          ],
          [
            "fbcHappyPath"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
          "LineNumber": 132
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies the fbc release pipelinerun is running and succeeds",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.061854609Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite FBC e2e-tests]",
          "with FBC happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 88
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 122
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "fbc-release"
          ],
          [
            "fbcHappyPath"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
          "LineNumber": 136
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies release CR completed and set succeeded.",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.062120616Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite FBC e2e-tests]",
          "with FBC Staged Index",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 142
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 177
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "fbc-release"
          ],
          [
            "fbcStagedIndex"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
          "LineNumber": 178
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.062423115Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite FBC e2e-tests]",
          "with FBC Staged Index",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 142
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 177
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "fbc-release"
          ],
          [
            "fbcStagedIndex"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
          "LineNumber": 183
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "Creates a push snapshot for a release",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.062677351Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite FBC e2e-tests]",
          "with FBC Staged Index",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 142
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 177
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "fbc-release"
          ],
          [
            "fbcStagedIndex"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
          "LineNumber": 187
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies the fbc release pipelinerun is running and succeeds",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.062922898Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite FBC e2e-tests]",
          "with FBC Staged Index",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 142
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 177
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "fbc-release"
          ],
          [
            "fbcStagedIndex"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
          "LineNumber": 191
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies release CR completed and set succeeded.",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.157310981Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite FBC e2e-tests]",
          "with FBC hotfix process",
          "FBC hotfix post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 197
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 231
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "fbc-release"
          ],
          [
            "fbcHotfix"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
          "LineNumber": 233
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.157877646Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite FBC e2e-tests]",
          "with FBC hotfix process",
          "FBC hotfix post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 197
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 231
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "fbc-release"
          ],
          [
            "fbcHotfix"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
          "LineNumber": 238
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "Creates a push snapshot for a release",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.158312398Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite FBC e2e-tests]",
          "with FBC hotfix process",
          "FBC hotfix post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 197
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 231
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "fbc-release"
          ],
          [
            "fbcHotfix"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
          "LineNumber": 242
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies the fbc release pipelinerun is running and succeeds",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.158880823Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite FBC e2e-tests]",
          "with FBC hotfix process",
          "FBC hotfix post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 197
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 231
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "fbc-release"
          ],
          [
            "fbcHotfix"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
          "LineNumber": 246
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies release CR completed and set succeeded.",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.1598969Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite FBC e2e-tests]",
          "with FBC pre-GA process",
          "FBC pre-GA post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 252
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 285
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "fbc-release"
          ],
          [
            "fbcPreGA"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
          "LineNumber": 286
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.256769689Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite FBC e2e-tests]",
          "with FBC pre-GA process",
          "FBC pre-GA post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 252
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 285
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "fbc-release"
          ],
          [
            "fbcPreGA"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
          "LineNumber": 291
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "Creates a push snapshot for a release",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.257419396Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite FBC e2e-tests]",
          "with FBC pre-GA process",
          "FBC pre-GA post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 252
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 285
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "fbc-release"
          ],
          [
            "fbcPreGA"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
          "LineNumber": 295
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies the fbc release pipelinerun is running and succeeds",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.257972501Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite FBC e2e-tests]",
          "with FBC pre-GA process",
          "FBC pre-GA post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 252
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
            "LineNumber": 285
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "fbc-release"
          ],
          [
            "fbcPreGA"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/fbc_release.go",
          "LineNumber": 299
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies release CR completed and set succeeded.",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.258206247Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 9,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test build secret lookup",
          "when two secrets are created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
            "LineNumber": 99
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "secret-lookup"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
          "LineNumber": 123
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates first component",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.959246938Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test build secret lookup",
          "when two secrets are created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
            "LineNumber": 99
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "secret-lookup"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
          "LineNumber": 140
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates second component",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.959890145Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test build secret lookup",
          "when two secrets are created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
            "LineNumber": 99
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "secret-lookup"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
          "LineNumber": 158
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "check first component annotation has errors",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.960800239Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test build secret lookup",
          "when two secrets are created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
            "LineNumber": 99
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "secret-lookup"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
          "LineNumber": 178
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggered PipelineRun is for component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.961050786Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test build secret lookup",
          "when two secrets are created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
            "LineNumber": 99
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "secret-lookup"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
          "LineNumber": 193
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "check only one pipelinerun should be triggered",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.056153048Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test build secret lookup",
          "when two secrets are created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
            "LineNumber": 29
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
            "LineNumber": 99
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "secret-lookup"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/secret_lookup.go",
          "LineNumber": 206
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "when second component is deleted, pac pr branch should not exist in the repo",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.056539279Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for rh-advisories pipeline]",
          "Rh-advisories happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_advisories.go",
            "LineNumber": 59
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_advisories.go",
            "LineNumber": 115
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rh-advisories"
          ],
          [
            "rhAdvisories"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_advisories.go",
          "LineNumber": 117
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies if release CR is created",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.05733815Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for rh-advisories pipeline]",
          "Rh-advisories happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_advisories.go",
            "LineNumber": 59
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_advisories.go",
            "LineNumber": 115
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rh-advisories"
          ],
          [
            "rhAdvisories"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_advisories.go",
          "LineNumber": 127
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies the advs release pipelinerun is running and succeeds",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.057666029Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for rh-advisories pipeline]",
          "Rh-advisories happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_advisories.go",
            "LineNumber": 59
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_advisories.go",
            "LineNumber": 115
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rh-advisories"
          ],
          [
            "rhAdvisories"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_advisories.go",
          "LineNumber": 157
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies release CR completed and set succeeded.",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.05885203Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for rh-advisories pipeline]",
          "Rh-advisories happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_advisories.go",
            "LineNumber": 59
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_advisories.go",
            "LineNumber": 115
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rh-advisories"
          ],
          [
            "rhAdvisories"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rh_advisories.go",
          "LineNumber": 168
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies if the repository URL is valid",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.05922865Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[task-suite tkn bundle task]",
          "creates Tekton bundles with different params"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 49
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/tkn-bundle.go",
            "LineNumber": 118
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-templates"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/tkn-bundle.go",
          "LineNumber": 188
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "when context points to a file",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.060312819Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[task-suite tkn bundle task]",
          "creates Tekton bundles with different params"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 49
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/tkn-bundle.go",
            "LineNumber": 118
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-templates"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/tkn-bundle.go",
          "LineNumber": 199
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates Tekton bundles from specific context",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.060661958Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[task-suite tkn bundle task]",
          "creates Tekton bundles with different params"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 49
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/tkn-bundle.go",
            "LineNumber": 118
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-templates"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/tkn-bundle.go",
          "LineNumber": 209
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "when context is the root directory",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.061230163Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[task-suite tkn bundle task]",
          "creates Tekton bundles with different params"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 49
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/tkn-bundle.go",
            "LineNumber": 118
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-templates"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/tkn-bundle.go",
          "LineNumber": 218
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates Tekton bundles when context points to a file and a directory",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.06150226Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[task-suite tkn bundle task]",
          "creates Tekton bundles with different params"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 49
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/tkn-bundle.go",
            "LineNumber": 118
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-templates"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/tkn-bundle.go",
          "LineNumber": 228
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates Tekton bundles when using negation",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.06185392Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[task-suite tkn bundle task]",
          "creates Tekton bundles with different params"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 49
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/tkn-bundle.go",
            "LineNumber": 118
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-templates"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/tkn-bundle.go",
          "LineNumber": 238
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "allows overriding HOME environment variable",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.062200679Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[task-suite tkn bundle task]",
          "creates Tekton bundles with different params"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 49
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/tkn-bundle.go",
            "LineNumber": 118
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-templates"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/tkn-bundle.go",
          "LineNumber": 247
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "allows overriding STEP image",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.062594119Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for release-to-github pipeline]",
          "Release-to-github happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/release_to_github.go",
            "LineNumber": 66
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/release_to_github.go",
            "LineNumber": 136
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "release-to-github"
          ],
          [
            "releaseToGithub"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/release_to_github.go",
          "LineNumber": 138
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies if release CR is created",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.063089092Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for release-to-github pipeline]",
          "Release-to-github happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/release_to_github.go",
            "LineNumber": 66
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/release_to_github.go",
            "LineNumber": 136
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "release-to-github"
          ],
          [
            "releaseToGithub"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/release_to_github.go",
          "LineNumber": 148
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies the release pipelinerun is running and succeeds",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.157608999Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for release-to-github pipeline]",
          "Release-to-github happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/release_to_github.go",
            "LineNumber": 66
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/release_to_github.go",
            "LineNumber": 136
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "release-to-github"
          ],
          [
            "releaseToGithub"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/release_to_github.go",
          "LineNumber": 181
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies release CR completed and set succeeded.",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.157872526Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for release-to-github pipeline]",
          "Release-to-github happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/release_to_github.go",
            "LineNumber": 66
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/release_to_github.go",
            "LineNumber": 136
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "release-to-github"
          ],
          [
            "releaseToGithub"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/release_to_github.go",
          "LineNumber": 192
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies if the Release exists in github repo",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.158237586Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test pac with multiple components using same repository",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 32
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 97
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "multi-component"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
          "LineNumber": 106
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates component with context directory go-component",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.158820101Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test pac with multiple components using same repository",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 32
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 97
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "multi-component"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
          "LineNumber": 125
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers a PipelineRun for component go-component-hycbkb",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.159198341Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test pac with multiple components using same repository",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 32
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 97
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "multi-component"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
          "LineNumber": 140
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a PaC PR creation for component go-component-hycbkb",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.159508919Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test pac with multiple components using same repository",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 32
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 97
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "multi-component"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
          "LineNumber": 159
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "the PipelineRun should eventually finish successfully for component go-component-hycbkb",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.256680687Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test pac with multiple components using same repository",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 32
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 97
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "multi-component"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
          "LineNumber": 164
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "merging the PR should be successful",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.257237441Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test pac with multiple components using same repository",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 32
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 97
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "multi-component"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
          "LineNumber": 174
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "leads to triggering on push PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.257494698Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test pac with multiple components using same repository",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 32
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 97
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "multi-component"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
          "LineNumber": 106
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates component with context directory python-component",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.257974921Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test pac with multiple components using same repository",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 32
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 97
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "multi-component"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
          "LineNumber": 125
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers a PipelineRun for component python-component-jlaetj",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258196707Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test pac with multiple components using same repository",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 32
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 97
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "multi-component"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
          "LineNumber": 140
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a PaC PR creation for component python-component-jlaetj",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258439043Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test pac with multiple components using same repository",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 32
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 97
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "multi-component"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
          "LineNumber": 159
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "the PipelineRun should eventually finish successfully for component python-component-jlaetj",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258670089Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test pac with multiple components using same repository",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 32
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 97
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "multi-component"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
          "LineNumber": 164
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "merging the PR should be successful",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258814973Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test pac with multiple components using same repository",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 32
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 97
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "multi-component"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
          "LineNumber": 174
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "leads to triggering on push PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258995728Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test pac with multiple components using same repository",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 32
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 97
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "multi-component"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
          "LineNumber": 190
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "only one component is changed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.259259155Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test pac with multiple components using same repository",
          "when components are created in same namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 32
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 97
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "multi-component"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
          "LineNumber": 205
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "only related pipelinerun should be triggered",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.25945509Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test pac with multiple components using same repository",
          "when a components is created with same git url in different namespace"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 32
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
            "LineNumber": 219
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "pac-build",
            "multi-component"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/multi_component.go",
          "LineNumber": 264
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should fail to configure PaC for the component",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.259580584Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 10,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for rhtap-service-push pipeline]",
          "Rhtap-service-push happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rhtap_service_push.go",
            "LineNumber": 74
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rhtap_service_push.go",
            "LineNumber": 149
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rhtap-service-push"
          ],
          [
            "RhtapServicePush"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rhtap_service_push.go",
          "LineNumber": 150
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies if the release CR is created",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.055758148Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for rhtap-service-push pipeline]",
          "Rhtap-service-push happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rhtap_service_push.go",
            "LineNumber": 74
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rhtap_service_push.go",
            "LineNumber": 149
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rhtap-service-push"
          ],
          [
            "RhtapServicePush"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rhtap_service_push.go",
          "LineNumber": 160
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies the rhtap release pipelinerun is running and succeeds",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.057005071Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for rhtap-service-push pipeline]",
          "Rhtap-service-push happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rhtap_service_push.go",
            "LineNumber": 74
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rhtap_service_push.go",
            "LineNumber": 149
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rhtap-service-push"
          ],
          [
            "RhtapServicePush"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rhtap_service_push.go",
          "LineNumber": 190
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies release CR completed and set succeeded.",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.057300659Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for rhtap-service-push pipeline]",
          "Rhtap-service-push happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rhtap_service_push.go",
            "LineNumber": 74
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rhtap_service_push.go",
            "LineNumber": 149
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rhtap-service-push"
          ],
          [
            "RhtapServicePush"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/rhtap_service_push.go",
          "LineNumber": 200
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies if the PR in infra-deployments repo is created/updated",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.059185759Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.]",
          "post-release verification."
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/missing_release_plan_and_admission.go",
            "LineNumber": 65
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "release-neg",
            "negMissingReleasePlan"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/missing_release_plan_and_admission.go",
          "LineNumber": 66
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "missing ReleasePlan makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user.",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.060106183Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.]",
          "post-release verification."
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/missing_release_plan_and_admission.go",
            "LineNumber": 65
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "release-neg",
            "negMissingReleasePlan"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/missing_release_plan_and_admission.go",
          "LineNumber": 76
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "missing ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user.",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.06075994Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test build annotations",
          "when component is created with invalid build request annotations"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/annotations.go",
            "LineNumber": 28
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/annotations.go",
            "LineNumber": 63
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github",
            "annotations"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/annotations.go",
          "LineNumber": 89
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "handles invalid request annotation",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.0614987Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 325
        },
        "LeafNodeLabels": [
          "build-templates-e2e",
          "source-build-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers PipelineRun for symlink component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-abad",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.062321922Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 338
        },
        "LeafNodeLabels": [
          "build-templates-e2e",
          "source-build-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.062665881Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 338
        },
        "LeafNodeLabels": [
          "build-templates-e2e",
          "source-build-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.063192685Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 338
        },
        "LeafNodeLabels": [
          "build-templates-e2e",
          "source-build-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.15614164Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 356
        },
        "LeafNodeLabels": [
          "build-templates-e2e",
          "source-build-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.157567448Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 366
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should push Dockerfile to registry",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.158060401Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 378
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "floating tags are created successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.158292937Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 395
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "image manifest mediaType is correct",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.158651477Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 420
        },
        "LeafNodeLabels": [
          "build-templates-e2e",
          "source-build-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "check for source images if enabled in pipeline",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.158969735Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build)",
          "when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 473
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null,
          [
            "pipeline"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 498
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should have Pipeline Records",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.159614132Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build)",
          "when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 473
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null,
          [
            "pipeline"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 507
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should have Pipeline Logs",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.160175657Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 540
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.160407143Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build)",
          "when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 546
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null,
          [
            "sbom",
            "slow"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 569
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verify-enterprise-contract check should pass",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.160573198Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build)",
          "when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 546
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null,
          [
            "sbom",
            "slow"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 661
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should have Hermeto content in the SBOM in case the build was hermetic",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.160723242Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build)",
          "build-definitions ec pipelines"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 700
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null,
          [
            "build-templates-e2e"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 744
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "runs ec pipeline pipelines/enterprise-contract.yaml",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.160890626Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 356
        },
        "LeafNodeLabels": [
          "build-templates-e2e",
          "source-build-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.161081291Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 366
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should push Dockerfile to registry",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.161205104Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 378
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "floating tags are created successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.161313007Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 395
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "image manifest mediaType is correct",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.16140819Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 420
        },
        "LeafNodeLabels": [
          "build-templates-e2e",
          "source-build-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "check for source images if enabled in pipeline",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.161500342Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta)",
          "when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 473
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null,
          [
            "pipeline"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 498
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should have Pipeline Records",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.161647126Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta)",
          "when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 473
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null,
          [
            "pipeline"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 507
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should have Pipeline Logs",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.161764489Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 540
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.161850101Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta)",
          "when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 546
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null,
          [
            "sbom",
            "slow"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 569
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verify-enterprise-contract check should pass",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.161970925Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta)",
          "when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 546
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null,
          [
            "sbom",
            "slow"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 661
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should have Hermeto content in the SBOM in case the build was hermetic",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.162069127Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta)",
          "build-definitions ec pipelines"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 700
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null,
          [
            "build-templates-e2e"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 744
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "runs ec pipeline pipelines/enterprise-contract.yaml",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.162195011Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta-min)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 356
        },
        "LeafNodeLabels": [
          "build-templates-e2e",
          "source-build-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.256872262Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta-min)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 366
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should push Dockerfile to registry",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.257345334Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta-min)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 378
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "floating tags are created successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258023832Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta-min)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 395
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "image manifest mediaType is correct",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258404952Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta-min)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 420
        },
        "LeafNodeLabels": [
          "build-templates-e2e",
          "source-build-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "check for source images if enabled in pipeline",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258572957Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta-min)",
          "when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 473
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null,
          [
            "pipeline"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 498
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should have Pipeline Records",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258764612Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta-min)",
          "when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 473
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null,
          [
            "pipeline"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 507
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should have Pipeline Logs",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.258976768Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta-min)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 540
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.259154702Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta-min)",
          "when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 546
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null,
          [
            "sbom",
            "slow"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 569
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verify-enterprise-contract check should pass",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.259297886Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta-min)",
          "when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 546
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null,
          [
            "sbom",
            "slow"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 661
        },
        "LeafNodeLabels": [
          "build-templates-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should have Hermeto content in the SBOM in case the build was hermetic",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.25943483Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines",
          "scenario sample-python-basic-oci (docker-build-oci-ta-min)",
          "build-definitions ec pipelines"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 354
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 700
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ],
          null,
          [
            "build-templates-e2e"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 744
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "runs ec pipeline pipelines/enterprise-contract.yaml",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.259599454Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build templates E2E test]",
          "HACBS pipelines"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
            "LineNumber": 210
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build",
            "build-templates",
            "HACBS",
            "pipeline-service"
          ],
          [
            "pipeline"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/build_templates.go",
          "LineNumber": 816
        },
        "LeafNodeLabels": [
          "build-templates-e2e",
          "source-build-e2e"
        ],
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "pipelineRun should fail for symlink component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-abad",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.259746308Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 4,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 136
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "correctly targets the default branch (that is not named 'main') with PaC",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.157587579Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 153
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "workspace parameter is set correctly in PaC repository CR",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.158134713Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 176
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers a PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.158508743Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 191
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "build pipeline uses the correct serviceAccount",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.158800171Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 195
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "component build status is set correctly",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.159115449Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 225
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "image repo and robot account created successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.159407037Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 243
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "created image repo is private",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.159695794Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 249
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "a related PipelineRun should be deleted after deleting the component",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.256461811Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 265
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "PR branch should not exist in the repo",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.25717174Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 278
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "related image repo and the robot account should be deleted after deleting the component",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.257360085Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 332
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers a PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.257910719Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 347
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a PaC init PR creation",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258241958Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 365
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "the PipelineRun should eventually finish successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258513965Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 371
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "image repo and robot account created successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.25868205Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 390
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "created image repo is public",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258826664Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 396
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "image tag is updated successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258982198Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 425
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should ensure pruning labels are set",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.259199594Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 439
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to the PipelineRun status report at Checks tab",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.259422529Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when the PaC init branch is updated"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 451
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 464
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to triggering another PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.259590244Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when the PaC init branch is updated"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 451
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 479
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a PaC init PR update",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.259783249Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when the PaC init branch is updated"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 451
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 498
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "PipelineRun should eventually finish",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.264207326Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when the PaC init branch is updated"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 451
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 504
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to another update of a PR about the PipelineRun status report at Checks tab",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.264521575Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 530
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to triggering another PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.264792012Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 546
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "pipelineRun should eventually finish",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.265145931Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 552
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "does not have expiration set",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.26546636Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 564
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "After updating image visibility to private, it should not trigger another PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.265705086Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 595
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "image repo is updated to private",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.266024484Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 600
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "retrigger the pipeline manually",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.266203489Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 642
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "retriggered pipelineRun should eventually finish",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.266552838Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gh",
          "PaC component build",
          "when the component is removed and recreated (with the same name in the same namespace)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 647
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "github"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 715
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should no longer lead to a creation of a PaC PR",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.267339859Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 12,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 136
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "correctly targets the default branch (that is not named 'main') with PaC",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.156084429Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 153
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "workspace parameter is set correctly in PaC repository CR",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.157917297Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 176
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers a PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.158736119Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 191
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "build pipeline uses the correct serviceAccount",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.159443578Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 195
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "component build status is set correctly",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.256393529Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 225
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "image repo and robot account created successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.256658866Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 243
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "created image repo is private",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.257137019Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 249
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "a related PipelineRun should be deleted after deleting the component",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.257390395Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 265
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "PR branch should not exist in the repo",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.257891909Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 278
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "related image repo and the robot account should be deleted after deleting the component",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258370361Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 332
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers a PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258585677Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 347
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a PaC init PR creation",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258738901Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 365
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "the PipelineRun should eventually finish successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258990258Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 371
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "image repo and robot account created successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.259252145Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 390
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "created image repo is public",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.259507472Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 396
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "image tag is updated successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.259687287Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 425
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should ensure pruning labels are set",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.259907972Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 439
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to the PipelineRun status report at Checks tab",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.264266428Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when the PaC init branch is updated"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 451
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 464
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to triggering another PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.264566386Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when the PaC init branch is updated"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 451
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 479
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a PaC init PR update",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.265012698Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when the PaC init branch is updated"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 451
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 498
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "PipelineRun should eventually finish",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.265373227Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when the PaC init branch is updated"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 451
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 504
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to another update of a PR about the PipelineRun status report at Checks tab",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.265602143Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 530
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to triggering another PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.265810429Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 546
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "pipelineRun should eventually finish",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.266074026Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 552
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "does not have expiration set",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.266250121Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 564
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "After updating image visibility to private, it should not trigger another PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.266824876Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 595
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "image repo is updated to private",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.26734907Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 600
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "retrigger the pipeline manually",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.267501603Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 642
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "retriggered pipelineRun should eventually finish",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.267672298Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "fj",
          "PaC component build",
          "when the component is removed and recreated (with the same name in the same namespace)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 647
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "forgejo"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 715
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should no longer lead to a creation of a PaC PR",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.267865653Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 13,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 136
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "correctly targets the default branch (that is not named 'main') with PaC",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.157888596Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 153
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "workspace parameter is set correctly in PaC repository CR",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.159557731Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 176
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers a PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.256617215Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 191
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "build pipeline uses the correct serviceAccount",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.257113578Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 195
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "component build status is set correctly",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.257325964Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 225
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "image repo and robot account created successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.257824047Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 243
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "created image repo is private",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258053553Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 249
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "a related PipelineRun should be deleted after deleting the component",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258342031Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 265
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "PR branch should not exist in the repo",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258527496Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new component without specified branch is created and with visibility private"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 114
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "pac-custom-default-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 278
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "related image repo and the robot account should be deleted after deleting the component",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258764422Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 332
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers a PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.258975348Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 347
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a PaC init PR creation",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.259209774Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 365
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "the PipelineRun should eventually finish successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.25943909Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 371
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "image repo and robot account created successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.259580464Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 390
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "created image repo is public",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.259770059Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 396
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "image tag is updated successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.264091863Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 425
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should ensure pruning labels are set",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.264431582Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 439
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to the PipelineRun status report at Checks tab",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.264747301Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when the PaC init branch is updated"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 451
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 464
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to triggering another PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.265182672Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when the PaC init branch is updated"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 451
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 479
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a PaC init PR update",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.265353717Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when the PaC init branch is updated"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 451
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 498
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "PipelineRun should eventually finish",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.265703056Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when the PaC init branch is updated"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 451
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 504
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to another update of a PR about the PipelineRun status report at Checks tab",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.266094186Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 530
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to triggering another PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.266289862Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 546
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "pipelineRun should eventually finish",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.266953909Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 552
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "does not have expiration set",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.26737978Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 564
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "After updating image visibility to private, it should not trigger another PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.267525514Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 595
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "image repo is updated to private",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.267709289Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 600
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "retrigger the pipeline manually",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.267912165Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when the PaC init branch is merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 516
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 642
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "retriggered pipelineRun should eventually finish",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.26814014Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[build-service-suite Build service E2E tests]",
          "test git provider",
          "gl",
          "PaC component build",
          "when the component is removed and recreated (with the same name in the same namespace)"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 13
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 35
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/git_provider_config.go",
            "LineNumber": 122
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 37
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
            "LineNumber": 647
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "build-service"
          ],
          [
            "github-webhook",
            "pac-build",
            "pipeline",
            "image-controller"
          ],
          [
            "gitlab"
          ],
          null,
          [
            "build-custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/build/pac_build.go",
          "LineNumber": 715
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should no longer lead to a creation of a PaC PR",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.268319965Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 5,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 108
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          [
            "custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 130
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers a Build PipelineRun",
        "State": "passed",
        "StartTime": "2026-04-20T17:29:41.056847527Z",
        "EndTime": "2026-04-20T17:30:46.150855622Z",
        "RunTime": 65094008105,
        "ParallelProcess": 16,
        "NumAttempts": 1,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0,
        "CapturedGinkgoWriterOutput": "Image repository for component test-comp-pac-gitlab-jibnbb in namespace gitlab-rep-hzqs do not have right state ('' != 'ready') yet but it has status {  { } {\u003cnil\u003e      } []}.\nBuild PipelineRun has not been created yet for the component gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb\nBuild PipelineRun has not been created yet for the component gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb\n",
        "SpecEvents": [
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 45
            },
            "TimelineLocation": {
              "Order": 1,
              "Time": "2026-04-20T17:29:41.057442263Z"
            },
            "Message": "Gitlab with status reporting of Integration tests in the assosiated merge request",
            "NodeType": "BeforeAll"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 45
            },
            "TimelineLocation": {
              "Order": 3,
              "Time": "2026-04-20T17:29:46.09392005Z"
            },
            "Message": "Gitlab with status reporting of Integration tests in the assosiated merge request",
            "Duration": 5036477797,
            "NodeType": "BeforeAll"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 109
            },
            "TimelineLocation": {
              "Order": 4,
              "Time": "2026-04-20T17:29:46.094190637Z"
            },
            "Message": "when a new Component with specified custom branch is created",
            "NodeType": "BeforeAll"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 109
            },
            "TimelineLocation": {
              "Offset": 176,
              "Order": 6,
              "Time": "2026-04-20T17:30:06.119515434Z"
            },
            "Message": "when a new Component with specified custom branch is created",
            "Duration": 20025324787,
            "NodeType": "BeforeAll"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 130
            },
            "TimelineLocation": {
              "Offset": 176,
              "Order": 7,
              "Time": "2026-04-20T17:30:06.11973709Z"
            },
            "Message": "triggers a Build PipelineRun",
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 130
            },
            "TimelineLocation": {
              "Offset": 386,
              "Order": 9,
              "Time": "2026-04-20T17:30:46.150592346Z"
            },
            "Message": "triggers a Build PipelineRun",
            "Duration": 40030855255,
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 42
            },
            "TimelineLocation": {
              "Offset": 386,
              "Order": 10,
              "Time": "2026-04-20T17:30:46.150808571Z"
            },
            "Message": "[integration-service-suite Gitlab Status Reporting of Integration tests]",
            "NodeType": "AfterEach"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 42
            },
            "TimelineLocation": {
              "Offset": 386,
              "Order": 12,
              "Time": "2026-04-20T17:30:46.150847652Z"
            },
            "Message": "[integration-service-suite Gitlab Status Reporting of Integration tests]",
            "Duration": 39081,
            "NodeType": "AfterEach"
          }
        ]
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 108
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          [
            "custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 144
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "does not contain an annotation with a Snapshot Name",
        "State": "passed",
        "StartTime": "2026-04-20T17:30:46.151283913Z",
        "EndTime": "2026-04-20T17:30:46.15156982Z",
        "RunTime": 285917,
        "ParallelProcess": 16,
        "NumAttempts": 1,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0,
        "SpecEvents": [
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 144
            },
            "TimelineLocation": {
              "Order": 13,
              "Time": "2026-04-20T17:30:46.151387876Z"
            },
            "Message": "does not contain an annotation with a Snapshot Name",
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 144
            },
            "TimelineLocation": {
              "Order": 15,
              "Time": "2026-04-20T17:30:46.151427727Z"
            },
            "Message": "does not contain an annotation with a Snapshot Name",
            "Duration": 39861,
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 42
            },
            "TimelineLocation": {
              "Order": 16,
              "Time": "2026-04-20T17:30:46.15154199Z"
            },
            "Message": "[integration-service-suite Gitlab Status Reporting of Integration tests]",
            "NodeType": "AfterEach"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 42
            },
            "TimelineLocation": {
              "Order": 18,
              "Time": "2026-04-20T17:30:46.15156307Z"
            },
            "Message": "[integration-service-suite Gitlab Status Reporting of Integration tests]",
            "Duration": 21080,
            "NodeType": "AfterEach"
          }
        ]
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 108
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          [
            "custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 148
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to build PipelineRun finishing successfully",
        "State": "failed",
        "StartTime": "2026-04-20T17:30:46.151814137Z",
        "EndTime": "2026-04-20T17:43:30.604874721Z",
        "RunTime": 764453060584,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Expected success, but got an error:\n    \u003c*errors.errorString | 0xc0022ab310\u003e: \n    \n     pod: test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd-init-pod | init container: prepare\n    2026/04/20 17:40:29 Entrypoint initialization\n    \n    pod: test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd-init-pod | container step-init: \n    time=\"2026-04-20T17:40:31Z\" level=info msg=\"Using in-cluster config\" logger=KubeClient\n    time=\"2026-04-20T17:40:31Z\" level=info msg=\"[param] enable: false\"\n    time=\"2026-04-20T17:40:31Z\" level=info msg=\"[param] default-http-proxy: squid.caching.svc.cluster.local:3128\"\n    time=\"2026-04-20T17:40:31Z\" level=info msg=\"[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\"\n    time=\"2026-04-20T17:40:31Z\" level=info msg=\"[param] http-proxy-result-path: /tekton/results/http-proxy\"\n    time=\"2026-04-20T17:40:31Z\" level=info msg=\"[param] no-proxy-result-path: /tekton/results/no-proxy\"\n    time=\"2026-04-20T17:40:31Z\" level=info msg=\"Cache proxy is disabled in param or in backend\"\n    time=\"2026-04-20T17:40:31Z\" level=info msg=\"[result] HTTP PROXY: \"\n    time=\"2026-04-20T17:40:31Z\" level=info msg=\"[result] NO PROXY: \"\n    \n     pod: test-comp-pac-gitlab-jibnbb1cf706c1a50543d374919dfe4da41e13-pod | init container: prepare\n    2026/04/20 17:42:15 Entrypoint initialization\n    \n     pod: test-comp-pac-gitlab-jibnbb1cf706c1a50543d374919dfe4da41e13-pod | init container: place-scripts\n    2026/04/20 17:42:16 Decoded script /tekton/scripts/script-0-c9pnh\n    2026/04/20 17:42:16 Decoded script /tekton/scripts/script-1-h98qx\n    \n    pod: test-comp-pac-gitlab-jibnbb1cf706c1a50543d374919dfe4da41e13-pod | container step-extract-and-scan-image: \n    Starting clamd ...\n    clamd is ready!\n    Detecting artifact type for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb@sha256:711c5a03b75e34a917b3871baf41335c4ada2e2e24813c2f9e62e7dbc0c29350.\n    Detected container image. Processing image manifests.\n    Running \"oc image extract\" on image of arch amd64\n    Scanning image for arch amd64. This operation may take a while.\n    \n    ----------- SCAN SUMMARY -----------\n    Infected files: 0\n    Time: 45.735 sec (0 m 45 s)\n    Start Date: 2026:04:20 17:42:35\n    End Date:   2026:04:20 17:43:20\n    Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27977/Mon Apr 20 06:26:26 2026 Database version: 27977\n    [\n    \t{\n    \t\t\"filename\": \"/work/logs/clamscan-result-log-amd64.json\",\n    \t\t\"namespace\": \"required_checks\",\n    \t\t\"successes\": 2\n    \t}\n    ]\n    {\"timestamp\":\"1776707000\",\"namespace\":\"required_checks\",\"successes\":2,\"failures\":0,\"warnings\":0,\"result\":\"SUCCESS\",\"note\":\"All checks passed successfully\"}\n    {\"timestamp\":\"1776707000\",\"namespace\":\"required_checks\",\"successes\":2,\"failures\":0,\"warnings\":0,\"result\":\"SUCCESS\",\"note\":\"All checks passed successfully\"}\n    {\"timestamp\":\"1776707000\",\"namespace\":\"required_checks\",\"successes\":2,\"failures\":0,\"warnings\":0,\"result\":\"SUCCESS\",\"note\":\"All checks passed successfully\"}\n    {\"image\": {\"pullspec\": \"quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\", \"digests\": [\"sha256:711c5a03b75e34a917b3871baf41335c4ada2e2e24813c2f9e62e7dbc0c29350\"]}}\n    \n    pod: test-comp-pac-gitlab-jibnbb1cf706c1a50543d374919dfe4da41e13-pod | container step-upload: \n    Selecting auth\n    Using token for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb\n    Attaching to quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\n    Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423@sha256:711c5a03b75e34a917b3871baf41335c4ada2e2e24813c2f9e62e7dbc0c29350 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json\n    Preparing clamscan-result-amd64.log\n    Preparing clamscan-ec-test-amd64.json\n    Exists    44136fa355b3 application/vnd.oci.empty.v1+json\n    Uploading d69762e0a313 clamscan-result-amd64.log\n    Uploading 02917e8a7c2a clamscan-ec-test-amd64.json\n    Uploaded  02917e8a7c2a clamscan-ec-test-amd64.json\n    Uploaded  d69762e0a313 clamscan-result-amd64.log\n    Uploading 4d89f12578e3 application/vnd.oci.image.manifest.v1+json\n    Uploaded  4d89f12578e3 application/vnd.oci.image.manifest.v1+json\n    Attached to [registry] quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423@sha256:711c5a03b75e34a917b3871baf41335c4ada2e2e24813c2f9e62e7dbc0c29350\n    Digest: sha256:4d89f12578e3c52a4088e8122bbb057076b541ff85885a61217ea5bff3ca432c\n    \n     pod: test-comp-pac-gitlab-jibnbb376cc194da8af1dedbf1fb9890f267fb-pod | init container: prepare\n    2026/04/20 17:42:16 Entrypoint initialization\n    \n    pod: test-comp-pac-gitlab-jibnbb376cc194da8af1dedbf1fb9890f267fb-pod | container step-apply-additional-tags: \n    time=\"2026-04-20T17:42:19Z\" level=info msg=\"[param] image-url: quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\"\n    time=\"2026-04-20T17:42:19Z\" level=info msg=\"[param] digest: sha256:711c5a03b75e34a917b3871baf41335c4ada2e2e24813c2f9e62e7dbc0c29350\"\n    time=\"2026-04-20T17:42:19Z\" level=info msg=\"[param] tags-from-image-label: konflux.additional-tags\"\n    time=\"2026-04-20T17:42:20Z\" level=warning msg=\"No tags given in 'konflux.additional-tags' image label\"\n    {\"tags\":[]}\n     pod: test-comp-pac-gitlab-jibnbb3a85f38965c3241201aff1e2c27c31f4-pod | init container: prepare\n    2026/04/20 17:42:16 Entrypoint initialization\n    \n     pod: test-comp-pac-gitlab-jibnbb3a85f38965c3241201aff1e2c27c31f4-pod | init container: place-scripts\n    2026/04/20 17:42:17 Decoded script /tekton/scripts/script-0-k54k2\n    2026/04/20 17:42:17 Decoded script /tekton/scripts/script-1-qh2sx\n    2026/04/20 17:42:17 Decoded script /tekton/scripts/script-2-49b85\n    2026/04/20 17:42:17 Decoded script /tekton/scripts/script-3-hdm56\n    2026/04/20 17:42:17 Decoded script /tekton/scripts/script-4-72hsx\n    2026/04/20 17:42:17 Decoded script /tekton/scripts/script-5-rhrst\n    \n    pod: test-comp-pac-gitlab-jibnbb3a85f38965c3241201aff1e2c27c31f4-pod | container step-introspect: \n    Artifact type will be determined by introspection.\n    Checking the media type of the OCI artifact...\n    [retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\n    The media type of the OCI artifact is application/vnd.docker.distribution.manifest.v2+json.\n    Looking for image labels that indicate this might be an operator bundle...\n    [retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\n    Found 0 matching labels.\n    Expecting 3 or more to identify this image as an operator bundle.\n    Introspection concludes that this artifact is of type \"application\".\n    \n    pod: test-comp-pac-gitlab-jibnbb3a85f38965c3241201aff1e2c27c31f4-pod | container step-generate-container-auth: \n    Selecting auth for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\n    Using token for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb\n    Auth json written to \"/auth/auth.json\".\n    \n    pod: test-comp-pac-gitlab-jibnbb3a85f38965c3241201aff1e2c27c31f4-pod | container step-set-skip-for-bundles: \n    2026/04/20 17:42:41 INFO Step was skipped due to when expressions were evaluated to false.\n    \n    pod: test-comp-pac-gitlab-jibnbb3a85f38965c3241201aff1e2c27c31f4-pod | container step-app-check: \n    time=\"2026-04-20T17:42:42Z\" level=info msg=\"certification library version\" version=\"1.17.1 \u003ccommit: f7de82ae1c76e6c10ea94967d6b6a66f96248cbe\u003e\"\n    time=\"2026-04-20T17:42:42Z\" level=info msg=\"running checks for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423 for platform amd64\"\n    time=\"2026-04-20T17:42:42Z\" level=info msg=\"target image\" image=\"quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\"\n    time=\"2026-04-20T17:42:49Z\" level=info msg=\"warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-1085214495/fs/licenses: no such file or directory\" check=HasLicense\n    time=\"2026-04-20T17:42:49Z\" level=info msg=\"check completed\" check=HasLicense result=FAILED\n    time=\"2026-04-20T17:42:49Z\" level=info msg=\"check completed\" check=HasUniqueTag result=PASSED\n    time=\"2026-04-20T17:42:49Z\" level=info msg=\"check completed\" check=LayerCountAcceptable result=PASSED\n    time=\"2026-04-20T17:42:49Z\" level=info msg=\"check completed\" check=HasNoProhibitedPackages result=PASSED\n    time=\"2026-04-20T17:42:49Z\" level=info msg=\"check completed\" check=HasRequiredLabel result=PASSED\n    time=\"2026-04-20T17:42:49Z\" level=info msg=\"USER 185 specified that is non-root\" check=RunAsNonRoot\n    time=\"2026-04-20T17:42:49Z\" level=info msg=\"check completed\" check=RunAsNonRoot result=PASSED\n    time=\"2026-04-20T17:42:58Z\" level=info msg=\"check completed\" check=HasModifiedFiles result=PASSED\n    time=\"2026-04-20T17:42:58Z\" level=info msg=\"check completed\" check=BasedOnUbi result=PASSED\n    time=\"2026-04-20T17:42:58Z\" level=info msg=\"This image's tag on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423 will be paired with digest sha256:711c5a03b75e34a917b3871baf41335c4ada2e2e24813c2f9e62e7dbc0c29350 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.\"\n    {\n        \"image\": \"quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\",\n        \"passed\": false,\n        \"test_library\": {\n            \"name\": \"github.com/redhat-openshift-ecosystem/openshift-preflight\",\n            \"version\": \"1.17.1\",\n            \"commit\": \"f7de82ae1c76e6c10ea94967d6b6a66f96248cbe\"\n        },\n        \"results\": {\n            \"passed\": [\n                {\n                    \"name\": \"HasUniqueTag\",\n                    \"elapsed_time\": 0,\n                    \"description\": \"Checking if container has a tag other than 'latest', so that the image can be uniquely identified.\"\n                },\n                {\n                    \"name\": \"LayerCountAcceptable\",\n                    \"elapsed_time\": 0,\n                    \"description\": \"Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.\"\n                },\n                {\n                    \"name\": \"HasNoProhibitedPackages\",\n                    \"elapsed_time\": 36,\n                    \"description\": \"Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.\"\n                },\n                {\n                    \"name\": \"HasRequiredLabel\",\n                    \"elapsed_time\": 0,\n                    \"description\": \"Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata\"\n                },\n                {\n                    \"name\": \"RunAsNonRoot\",\n                    \"elapsed_time\": 0,\n                    \"description\": \"Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication\"\n                },\n                {\n                    \"name\": \"HasModifiedFiles\",\n                    \"elapsed_time\": 8261,\n                    \"description\": \"Checks that no files installed via RPM in the base Red Hat layer have been modified\"\n                },\n                {\n                    \"name\": \"BasedOnUbi\",\n                    \"elapsed_time\": 387,\n                    \"description\": \"Checking if the container's base image is based upon the Red Hat Universal Base Image (UBI)\"\n                }\n            ],\n            \"failed\": [\n                {\n                    \"name\": \"HasLicense\",\n                    \"elapsed_time\": 0,\n                    \"description\": \"Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses\",\n                    \"help\": \"Check HasLicense encountered an error. Please review the preflight.log file for more information.\",\n                    \"suggestion\": \"Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.\",\n                    \"knowledgebase_url\": \"https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction\",\n                    \"check_url\": \"https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction\"\n                }\n            ],\n            \"errors\": []\n        }\n    }\n    time=\"2026-04-20T17:42:58Z\" level=info msg=\"Preflight result: FAILED\"\n    \n    pod: test-comp-pac-gitlab-jibnbb3a85f38965c3241201aff1e2c27c31f4-pod | container step-app-set-outcome: \n    {\"result\":\"FAILURE\",\"timestamp\":\"1776706979\",\"note\":\"Task preflight is a FAILURE: Refer to Tekton task logs for more information\",\"successes\":7,\"failures\":1,\"warnings\":0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\n    \n    pod: test-comp-pac-gitlab-jibnbb3a85f38965c3241201aff1e2c27c31f4-pod | container step-final-outcome: \n    + [[ ! -f /mount/konflux.results.json ]]\n    + tee /tekton/steps/step-final-outcome/results/test-output\n    {\"result\":\"FAILURE\",\"timestamp\":\"1776706979\",\"note\":\"Task preflight is a FAILURE: Refer to Tekton task logs for more information\",\"successes\":7,\"failures\":1,\"warnings\":0}\n     pod: test-comp-pac-gitlab-jibnbb490aa52eaed744434014e2a783066e0e-pod | init container: prepare\n    2026/04/20 17:42:15 Entrypoint initialization\n    \n     pod: test-comp-pac-gitlab-jibnbb490aa52eaed744434014e2a783066e0e-pod | init container: place-scripts\n    2026/04/20 17:42:15 Decoded script /tekton/scripts/script-0-4xq98\n    2026/04/20 17:42:15 Decoded script /tekton/scripts/script-1-mb7wc\n    2026/04/20 17:42:15 Decoded script /tekton/scripts/script-2-c2hsp\n    2026/04/20 17:42:15 Decoded script /tekton/scripts/script-3-vvk6b\n    \n    pod: test-comp-pac-gitlab-jibnbb490aa52eaed744434014e2a783066e0e-pod | container step-get-image-manifests: \n    \n    pod: test-comp-pac-gitlab-jibnbb490aa52eaed744434014e2a783066e0e-pod | container step-get-vulnerabilities: \n    \n    {\n        s: \"\\n pod: test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd-init-pod | init container: prepare\\n2026/04/20 17:40:29 Entrypoint initialization\\n\\npod: test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd-init-pod | container step-init: \\ntime=\\\"2026-04-20T17:40:31Z\\\" level=info msg=\\\"Using in-cluster config\\\" logger=KubeClient\\ntime=\\\"2026-04-20T17:40:31Z\\\" level=info msg=\\\"[param] enable: false\\\"\\ntime=\\\"2026-04-20T17:40:31Z\\\" level=info msg=\\\"[param] default-http-proxy: squid.caching.svc.cluster.local:3128\\\"\\ntime=\\\"2026-04-20T17:40:31Z\\\" level=info msg=\\\"[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\\\"\\ntime=\\\"2026-04-20T17:40:31Z\\\" level=info msg=\\\"[param] http-proxy-result-path: /tekton/results/http-proxy\\\"\\ntime=\\\"2026-04-20T17:40:31Z\\\" level=info msg=\\\"[param] no-proxy-result-path: /tekton/results/no-proxy\\\"\\ntime=\\\"2026-04-20T17:40:31Z\\\" level=info msg=\\\"Cache proxy is disabled in param or in backend\\\"\\ntime=\\\"2026-04-20T17:40:31Z\\\" level=info msg=\\\"[result] HTTP PROXY: \\\"\\ntime=\\\"2026-04-20T17:40:31Z\\\" level=info msg=\\\"[result] NO PROXY: \\\"\\n\\n pod: test-comp-pac-gitlab-jibnbb1cf706c1a50543d374919dfe4da41e13-pod | init container: prepare\\n2026/04/20 17:42:15 Entrypoint initialization\\n\\n pod: test-comp-pac-gitlab-jibnbb1cf706c1a50543d374919dfe4da41e13-pod | init container: place-scripts\\n2026/04/20 17:42:16 Decoded script /tekton/scripts/script-0-c9pnh\\n2026/04/20 17:42:16 Decoded script /tekton/scripts/script-1-h98qx\\n\\npod: test-comp-pac-gitlab-jibnbb1cf706c1a50543d374919dfe4da41e13-pod | container step-extract-and-scan-image: \\nStarting clamd ...\\nclamd is ready!\\nDetecting artifact type for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb@sha256:711c5a03b75e34a917b3871baf41335c4ada2e2e24813c2f9e62e7dbc0c29350.\\nDetected container image. Processing image manifests.\\nRunning \\\"oc image extract\\\" on image of arch amd64\\nScanning image for arch amd64. This operation may take a while.\\n\\n----------- SCAN SUMMARY -----------\\nInfected files: 0\\nTime: 45.735 sec (0 m 45 s)\\nStart Date: 2026:04:20 17:42:35\\nEnd Date:   2026:04:20 17:43:20\\nExecuted-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27977/Mon Apr 20 06:26:26 2026 Database version: 27977\\n[\\n\\t{\\n\\t\\t\\\"filename\\\": \\\"/work/logs/clamscan-result-log-amd64.json\\\",\\n\\t\\t\\\"namespace\\\": \\\"required_checks\\\",\\n\\t\\t\\\"successes\\\": 2\\n\\t}\\n]\\n{\\\"timestamp\\\":\\\"1776707000\\\",\\\"namespace\\\":\\\"required_checks\\\",\\\"successes\\\":2,\\\"failures\\\":0,\\\"warnings\\\":0,\\\"result\\\":\\\"SUCCESS\\\",\\\"note\\\":\\\"All checks passed successfully\\\"}\\n{\\\"timestamp\\\":\\\"1776707000\\\",\\\"namespace\\\":\\\"required_checks\\\",\\\"successes\\\":2,\\\"failures\\\":0,\\\"warnings\\\":0,\\\"result\\\":\\\"SUCCESS\\\",\\\"note\\\":\\\"All checks passed successfully\\\"}\\n{\\\"timestamp\\\":\\\"1776707000\\\",\\\"namespace\\\":\\\"required_checks\\\",\\\"successes\\\":2,\\\"failures\\\":0,\\\"warnings\\\":0,\\\"result\\\":\\\"SUCCESS\\\",\\\"note\\\":\\\"All checks passed successfully\\\"}\\n{\\\"image\\\": {\\\"pullspec\\\": \\\"quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\\\", \\\"digests\\\": [\\\"sha256:711c5a03b75e34a917b3871baf41335c4ada2e2e24813c2f9e62e7dbc0c29350\\\"]}}\\n\\npod: test-comp-pac-gitlab-jibnbb1cf706c1a50543d374919dfe4da41e13-pod | container step-upload: \\nSelecting auth\\nUsing token for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb\\nAttaching to quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\\nExecuting: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423@sha256:711c5a0...\n\nGomega truncated this representation as it exceeds 'format.MaxLength'.\nConsider having the object provide a custom 'GomegaStringer' representation\nor adjust the parameters in Gomega's 'format' package.\n\nLearn more here: https://onsi.github.io/gomega/#adjusting-output\n",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 150,
            "FullStackTrace": "github.com/konflux-ci/e2e-tests/tests/integration-service.init.func2.1.3.4()\n\t/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go:150 +0x98"
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 20,
            "Time": "2026-04-20T17:43:30.191267169Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 148
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 1,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0,
        "CapturedGinkgoWriterOutput": "PipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff found for Component gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: PipelineRunStopping\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: PipelineRunStopping\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff reason: Failed\nattempt 1/3: PipelineRun \"test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff\" failed: \n pod: test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff-init-pod | init container: prepare\n2026/04/20 17:30:37 Entrypoint initialization\n\npod: test-comp-pac-gitlab-jibnbb-on-pull-request-2qvff-init-pod | container step-init: \ntime=\"2026-04-20T17:30:54Z\" level=info msg=\"Using in-cluster config\" logger=KubeClient\ntime=\"2026-04-20T17:30:54Z\" level=info msg=\"[param] enable: false\"\ntime=\"2026-04-20T17:30:54Z\" level=info msg=\"[param] default-http-proxy: squid.caching.svc.cluster.local:3128\"\ntime=\"2026-04-20T17:30:54Z\" level=info msg=\"[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\"\ntime=\"2026-04-20T17:30:54Z\" level=info msg=\"[param] http-proxy-result-path: /tekton/results/http-proxy\"\ntime=\"2026-04-20T17:30:54Z\" level=info msg=\"[param] no-proxy-result-path: /tekton/results/no-proxy\"\ntime=\"2026-04-20T17:30:54Z\" level=info msg=\"Cache proxy is disabled in param or in backend\"\ntime=\"2026-04-20T17:30:54Z\" level=info msg=\"[result] HTTP PROXY: \"\ntime=\"2026-04-20T17:30:54Z\" level=info msg=\"[result] NO PROXY: \"\n\n pod: test-comp-pac-gitlab-jibnbb12494e1e71699aeda217384557f875f2-pod | init container: prepare\n2026/04/20 17:34:28 Entrypoint initialization\n\npod: test-comp-pac-gitlab-jibnbb12494e1e71699aeda217384557f875f2-pod | container step-apply-additional-tags: \ntime=\"2026-04-20T17:34:31Z\" level=info msg=\"[param] image-url: quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e5e31d390bcc636c70e0bb1ebbeab2573b555dc2\"\ntime=\"2026-04-20T17:34:31Z\" level=info msg=\"[param] digest: sha256:b48c1d654175840ada7322edb9edaecb1912ebfc1cb15d25ac312d7faf976988\"\ntime=\"2026-04-20T17:34:31Z\" level=info msg=\"[param] tags-from-image-label: konflux.additional-tags\"\ntime=\"2026-04-20T17:34:32Z\" level=warning msg=\"No tags given in 'konflux.additional-tags' image label\"\n{\"tags\":[]}\n pod: test-comp-pac-gitlab-jibnbb9a417a0c1e6a38829228f271e9ba8638-pod | init container: prepare\n2026/04/20 17:34:27 Entrypoint initialization\n\n pod: test-comp-pac-gitlab-jibnbb9a417a0c1e6a38829228f271e9ba8638-pod | init container: place-scripts\n2026/04/20 17:34:28 Decoded script /tekton/scripts/script-0-6gwdx\n2026/04/20 17:34:28 Decoded script /tekton/scripts/script-1-cf57s\n2026/04/20 17:34:28 Decoded script /tekton/scripts/script-2-g47fm\n2026/04/20 17:34:28 Decoded script /tekton/scripts/script-3-x9mfl\n2026/04/20 17:34:28 Decoded script /tekton/scripts/script-4-fgkmx\n2026/04/20 17:34:28 Decoded script /tekton/scripts/script-5-6cwrr\n\npod: test-comp-pac-gitlab-jibnbb9a417a0c1e6a38829228f271e9ba8638-pod | container step-introspect: \nArtifact type will be determined by introspection.\nChecking the media type of the OCI artifact...\n[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e5e31d390bcc636c70e0bb1ebbeab2573b555dc2\nThe media type of the OCI artifact is application/vnd.docker.distribution.manifest.v2+json.\nLooking for image labels that indicate this might be an operator bundle...\n[retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e5e31d390bcc636c70e0bb1ebbeab2573b555dc2\nFound 0 matching labels.\nExpecting 3 or more to identify this image as an operator bundle.\nIntrospection concludes that this artifact is of type \"application\".\n\npod: test-comp-pac-gitlab-jibnbb9a417a0c1e6a38829228f271e9ba8638-pod | container step-generate-container-auth: \nSelecting auth for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e5e31d390bcc636c70e0bb1ebbeab2573b555dc2\nUsing token for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb\nAuth json written to \"/auth/auth.json\".\n\npod: test-comp-pac-gitlab-jibnbb9a417a0c1e6a38829228f271e9ba8638-pod | container step-set-skip-for-bundles: \n2026/04/20 17:35:08 INFO Step was skipped due to when expressions were evaluated to false.\n\npod: test-comp-pac-gitlab-jibnbb9a417a0c1e6a38829228f271e9ba8638-pod | container step-app-check: \ntime=\"2026-04-20T17:35:08Z\" level=info msg=\"certification library version\" version=\"1.17.1 \u003ccommit: f7de82ae1c76e6c10ea94967d6b6a66f96248cbe\u003e\"\ntime=\"2026-04-20T17:35:08Z\" level=info msg=\"running checks for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e5e31d390bcc636c70e0bb1ebbeab2573b555dc2 for platform amd64\"\ntime=\"2026-04-20T17:35:08Z\" level=info msg=\"target image\" image=\"quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e5e31d390bcc636c70e0bb1ebbeab2573b555dc2\"\ntime=\"2026-04-20T17:35:16Z\" level=info msg=\"warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-3702090837/fs/licenses: no such file or directory\" check=HasLicense\ntime=\"2026-04-20T17:35:16Z\" level=info msg=\"check completed\" check=HasLicense result=FAILED\ntime=\"2026-04-20T17:35:16Z\" level=info msg=\"check completed\" check=HasUniqueTag result=PASSED\ntime=\"2026-04-20T17:35:16Z\" level=info msg=\"check completed\" check=LayerCountAcceptable result=PASSED\ntime=\"2026-04-20T17:35:16Z\" level=info msg=\"check completed\" check=HasNoProhibitedPackages result=PASSED\ntime=\"2026-04-20T17:35:16Z\" level=info msg=\"check completed\" check=HasRequiredLabel result=PASSED\ntime=\"2026-04-20T17:35:16Z\" level=info msg=\"USER 185 specified that is non-root\" check=RunAsNonRoot\ntime=\"2026-04-20T17:35:16Z\" level=info msg=\"check completed\" check=RunAsNonRoot result=PASSED\ntime=\"2026-04-20T17:35:25Z\" level=info msg=\"check completed\" check=HasModifiedFiles result=PASSED\ntime=\"2026-04-20T17:35:25Z\" level=info msg=\"check completed\" check=BasedOnUbi result=PASSED\ntime=\"2026-04-20T17:35:25Z\" level=info msg=\"This image's tag on-pr-e5e31d390bcc636c70e0bb1ebbeab2573b555dc2 will be paired with digest sha256:b48c1d654175840ada7322edb9edaecb1912ebfc1cb15d25ac312d7faf976988 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.\"\n{\n    \"image\": \"quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e5e31d390bcc636c70e0bb1ebbeab2573b555dc2\",\n    \"passed\": false,\n    \"test_library\": {\n        \"name\": \"github.com/redhat-openshift-ecosystem/openshift-preflight\",\n        \"version\": \"1.17.1\",\n        \"commit\": \"f7de82ae1c76e6c10ea94967d6b6a66f96248cbe\"\n    },\n    \"results\": {\n        \"passed\": [\n            {\n                \"name\": \"HasUniqueTag\",\n                \"elapsed_time\": 0,\n                \"description\": \"Checking if container has a tag other than 'latest', so that the image can be uniquely identified.\"\n            },\n            {\n                \"name\": \"LayerCountAcceptable\",\n                \"elapsed_time\": 0,\n                \"description\": \"Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.\"\n            },\n            {\n                \"name\": \"HasNoProhibitedPackages\",\n                \"elapsed_time\": 38,\n                \"description\": \"Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.\"\n            },\n            {\n                \"name\": \"HasRequiredLabel\",\n                \"elapsed_time\": 0,\n                \"description\": \"Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata\"\n            },\n            {\n                \"name\": \"RunAsNonRoot\",\n                \"elapsed_time\": 0,\n                \"description\": \"Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication\"\n            },\n            {\n                \"name\": \"HasModifiedFiles\",\n                \"elapsed_time\": 8573,\n                \"description\": \"Checks that no files installed via RPM in the base Red Hat layer have been modified\"\n            },\n            {\n                \"name\": \"BasedOnUbi\",\n                \"elapsed_time\": 179,\n                \"description\": \"Checking if the container's base image is based upon the Red Hat Universal Base Image (UBI)\"\n            }\n        ],\n        \"failed\": [\n            {\n                \"name\": \"HasLicense\",\n                \"elapsed_time\": 0,\n                \"description\": \"Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses\",\n                \"help\": \"Check HasLicense encountered an error. Please review the preflight.log file for more information.\",\n                \"suggestion\": \"Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.\",\n                \"knowledgebase_url\": \"https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction\",\n                \"check_url\": \"https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction\"\n            }\n        ],\n        \"errors\": []\n    }\n}\ntime=\"2026-04-20T17:35:25Z\" level=info msg=\"Preflight result: FAILED\"\n\npod: test-comp-pac-gitlab-jibnbb9a417a0c1e6a38829228f271e9ba8638-pod | container step-app-set-outcome: \n{\"result\":\"FAILURE\",\"timestamp\":\"1776706525\",\"note\":\"Task preflight is a FAILURE: Refer to Tekton task logs for more information\",\"successes\":7,\"failures\":1,\"warnings\":0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e5e31d390bcc636c70e0bb1ebbeab2573b555dc2\n\npod: test-comp-pac-gitlab-jibnbb9a417a0c1e6a38829228f271e9ba8638-pod | container step-final-outcome: \n+ [[ ! -f /mount/konflux.results.json ]]\n+ tee /tekton/steps/step-final-outcome/results/test-output\n{\"result\":\"FAILURE\",\"timestamp\":\"1776706525\",\"note\":\"Task preflight is a FAILURE: Refer to Tekton task logs for more information\",\"successes\":7,\"failures\":1,\"warnings\":0}\n pod: test-comp-pac-gitlab-jibnbbfe0c8c775dcc64ccc9d9dec2cf25c095-pod | init container: prepare\n2026/04/20 17:34:27 Entrypoint initialization\n\n pod: test-comp-pac-gitlab-jibnbbfe0c8c775dcc64ccc9d9dec2cf25c095-pod | init container: place-scripts\n2026/04/20 17:34:28 Decoded script /tekton/scripts/script-0-cq8nl\n2026/04/20 17:34:28 Decoded script /tekton/scripts/script-1-9bxpk\n\npod: test-comp-pac-gitlab-jibnbbfe0c8c775dcc64ccc9d9dec2cf25c095-pod | container step-extract-and-scan-image: \nStarting clamd ...\nclamd is ready!\nDetecting artifact type for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb@sha256:b48c1d654175840ada7322edb9edaecb1912ebfc1cb15d25ac312d7faf976988.\nDetected container image. Processing image manifests.\nRunning \"oc image extract\" on image of arch amd64\nScanning image for arch amd64. This operation may take a while.\n\n----------- SCAN SUMMARY -----------\nInfected files: 0\nTime: 42.455 sec (0 m 42 s)\nStart Date: 2026:04:20 17:34:53\nEnd Date:   2026:04:20 17:35:35\nExecuted-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27977/Mon Apr 20 06:26:26 2026 Database version: 27977\n[\n\t{\n\t\t\"filename\": \"/work/logs/clamscan-result-log-amd64.json\",\n\t\t\"namespace\": \"required_checks\",\n\t\t\"successes\": 2\n\t}\n]\n{\"timestamp\":\"1776706535\",\"namespace\":\"required_checks\",\"successes\":2,\"failures\":0,\"warnings\":0,\"result\":\"SUCCESS\",\"note\":\"All checks passed successfully\"}\n{\"timestamp\":\"1776706535\",\"namespace\":\"required_checks\",\"successes\":2,\"failures\":0,\"warnings\":0,\"result\":\"SUCCESS\",\"note\":\"All checks passed successfully\"}\n{\"timestamp\":\"1776706535\",\"namespace\":\"required_checks\",\"successes\":2,\"failures\":0,\"warnings\":0,\"result\":\"SUCCESS\",\"note\":\"All checks passed successfully\"}\n{\"image\": {\"pullspec\": \"quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e5e31d390bcc636c70e0bb1ebbeab2573b555dc2\", \"digests\": [\"sha256:b48c1d654175840ada7322edb9edaecb1912ebfc1cb15d25ac312d7faf976988\"]}}\n\npod: test-comp-pac-gitlab-jibnbbfe0c8c775dcc64ccc9d9dec2cf25c095-pod | container step-upload: \nSelecting auth\nUsing token for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb\nAttaching to quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e5e31d390bcc636c70e0bb1ebbeab2573b555dc2\nExecuting: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e5e31d390bcc636c70e0bb1ebbeab2573b555dc2@sha256:b48c1d654175840ada7322edb9edaecb1912ebfc1cb15d25ac312d7faf976988 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json\nPreparing clamscan-result-amd64.log\nPreparing clamscan-ec-test-amd64.json\nExists    44136fa355b3 application/vnd.oci.empty.v1+json\nUploading 6c123612408c clamscan-result-amd64.log\nUploading bf5f10bc03c6 clamscan-ec-test-amd64.json\nUploaded  6c123612408c clamscan-result-amd64.log\nUploaded  bf5f10bc03c6 clamscan-ec-test-amd64.json\nUploading 982bcccc8779 application/vnd.oci.image.manifest.v1+json\nUploaded  982bcccc8779 application/vnd.oci.image.manifest.v1+json\nAttached to [registry] quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e5e31d390bcc636c70e0bb1ebbeab2573b555dc2@sha256:b48c1d654175840ada7322edb9edaecb1912ebfc1cb15d25ac312d7faf976988\nDigest: sha256:982bcccc87791f3c3d2549c9aaae791cf83a949607042505009a2f88bba41f6e\nNew PipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-z5vmx found after retrigger for component gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-z5vmx found for Component gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-z5vmx reason: ResolvingTaskRef\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-z5vmx reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-z5vmx reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-z5vmx reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-z5vmx reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-z5vmx reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-z5vmx reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-z5vmx reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-z5vmx reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-z5vmx reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-z5vmx reason: PipelineRunStopping\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-z5vmx reason: Failed\nattempt 2/3: PipelineRun \"test-comp-pac-gitlab-jibnbb-on-pull-request-z5vmx\" failed: \n pod: test-comp-pac-gitlab-jibnbb-on-pull-request-z5vmx-init-pod | init container: prepare\n2026/04/20 17:36:39 Entrypoint initialization\n\npod: test-comp-pac-gitlab-jibnbb-on-pull-request-z5vmx-init-pod | container step-init: \ntime=\"2026-04-20T17:36:42Z\" level=info msg=\"Using in-cluster config\" logger=KubeClient\ntime=\"2026-04-20T17:36:42Z\" level=info msg=\"[param] enable: false\"\ntime=\"2026-04-20T17:36:42Z\" level=info msg=\"[param] default-http-proxy: squid.caching.svc.cluster.local:3128\"\ntime=\"2026-04-20T17:36:42Z\" level=info msg=\"[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\"\ntime=\"2026-04-20T17:36:42Z\" level=info msg=\"[param] http-proxy-result-path: /tekton/results/http-proxy\"\ntime=\"2026-04-20T17:36:42Z\" level=info msg=\"[param] no-proxy-result-path: /tekton/results/no-proxy\"\ntime=\"2026-04-20T17:36:42Z\" level=info msg=\"Cache proxy is disabled in param or in backend\"\ntime=\"2026-04-20T17:36:42Z\" level=info msg=\"[result] HTTP PROXY: \"\ntime=\"2026-04-20T17:36:42Z\" level=info msg=\"[result] NO PROXY: \"\n\n pod: test-comp-pac-gitlab-jibnbb2e4068001f7a64281751876b6bdec9f5-pod | init container: prepare\n2026/04/20 17:38:32 Entrypoint initialization\n\n pod: test-comp-pac-gitlab-jibnbb2e4068001f7a64281751876b6bdec9f5-pod | init container: place-scripts\n2026/04/20 17:38:33 Decoded script /tekton/scripts/script-0-zwl5r\n2026/04/20 17:38:33 Decoded script /tekton/scripts/script-1-dldsj\n2026/04/20 17:38:33 Decoded script /tekton/scripts/script-2-hcph8\n2026/04/20 17:38:33 Decoded script /tekton/scripts/script-3-cjdqx\n2026/04/20 17:38:33 Decoded script /tekton/scripts/script-4-cx86v\n2026/04/20 17:38:33 Decoded script /tekton/scripts/script-5-88vzx\n\npod: test-comp-pac-gitlab-jibnbb2e4068001f7a64281751876b6bdec9f5-pod | container step-introspect: \nArtifact type will be determined by introspection.\nChecking the media type of the OCI artifact...\n[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e378f362e1b4f61f636d7872b306807d05b0f496\nThe media type of the OCI artifact is application/vnd.docker.distribution.manifest.v2+json.\nLooking for image labels that indicate this might be an operator bundle...\n[retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e378f362e1b4f61f636d7872b306807d05b0f496\nFound 0 matching labels.\nExpecting 3 or more to identify this image as an operator bundle.\nIntrospection concludes that this artifact is of type \"application\".\n\npod: test-comp-pac-gitlab-jibnbb2e4068001f7a64281751876b6bdec9f5-pod | container step-generate-container-auth: \nSelecting auth for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e378f362e1b4f61f636d7872b306807d05b0f496\nUsing token for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb\nAuth json written to \"/auth/auth.json\".\n\npod: test-comp-pac-gitlab-jibnbb2e4068001f7a64281751876b6bdec9f5-pod | container step-set-skip-for-bundles: \n2026/04/20 17:39:11 INFO Step was skipped due to when expressions were evaluated to false.\n\npod: test-comp-pac-gitlab-jibnbb2e4068001f7a64281751876b6bdec9f5-pod | container step-app-check: \ntime=\"2026-04-20T17:39:11Z\" level=info msg=\"certification library version\" version=\"1.17.1 \u003ccommit: f7de82ae1c76e6c10ea94967d6b6a66f96248cbe\u003e\"\ntime=\"2026-04-20T17:39:12Z\" level=info msg=\"running checks for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e378f362e1b4f61f636d7872b306807d05b0f496 for platform amd64\"\ntime=\"2026-04-20T17:39:12Z\" level=info msg=\"target image\" image=\"quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e378f362e1b4f61f636d7872b306807d05b0f496\"\ntime=\"2026-04-20T17:39:20Z\" level=info msg=\"warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-529911138/fs/licenses: no such file or directory\" check=HasLicense\ntime=\"2026-04-20T17:39:20Z\" level=info msg=\"check completed\" check=HasLicense result=FAILED\ntime=\"2026-04-20T17:39:20Z\" level=info msg=\"check completed\" check=HasUniqueTag result=PASSED\ntime=\"2026-04-20T17:39:20Z\" level=info msg=\"check completed\" check=LayerCountAcceptable result=PASSED\ntime=\"2026-04-20T17:39:20Z\" level=info msg=\"check completed\" check=HasNoProhibitedPackages result=PASSED\ntime=\"2026-04-20T17:39:20Z\" level=info msg=\"check completed\" check=HasRequiredLabel result=PASSED\ntime=\"2026-04-20T17:39:20Z\" level=info msg=\"USER 185 specified that is non-root\" check=RunAsNonRoot\ntime=\"2026-04-20T17:39:20Z\" level=info msg=\"check completed\" check=RunAsNonRoot result=PASSED\ntime=\"2026-04-20T17:39:29Z\" level=info msg=\"check completed\" check=HasModifiedFiles result=PASSED\ntime=\"2026-04-20T17:39:29Z\" level=info msg=\"check completed\" check=BasedOnUbi result=PASSED\ntime=\"2026-04-20T17:39:29Z\" level=info msg=\"This image's tag on-pr-e378f362e1b4f61f636d7872b306807d05b0f496 will be paired with digest sha256:f812d66e5015b154031a7f3b11ededb252cd263e2f2d52539646b1457d7e9324 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.\"\n{\n    \"image\": \"quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e378f362e1b4f61f636d7872b306807d05b0f496\",\n    \"passed\": false,\n    \"test_library\": {\n        \"name\": \"github.com/redhat-openshift-ecosystem/openshift-preflight\",\n        \"version\": \"1.17.1\",\n        \"commit\": \"f7de82ae1c76e6c10ea94967d6b6a66f96248cbe\"\n    },\n    \"results\": {\n        \"passed\": [\n            {\n                \"name\": \"HasUniqueTag\",\n                \"elapsed_time\": 0,\n                \"description\": \"Checking if container has a tag other than 'latest', so that the image can be uniquely identified.\"\n            },\n            {\n                \"name\": \"LayerCountAcceptable\",\n                \"elapsed_time\": 0,\n                \"description\": \"Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.\"\n            },\n            {\n                \"name\": \"HasNoProhibitedPackages\",\n                \"elapsed_time\": 36,\n                \"description\": \"Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.\"\n            },\n            {\n                \"name\": \"HasRequiredLabel\",\n                \"elapsed_time\": 0,\n                \"description\": \"Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata\"\n            },\n            {\n                \"name\": \"RunAsNonRoot\",\n                \"elapsed_time\": 0,\n                \"description\": \"Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication\"\n            },\n            {\n                \"name\": \"HasModifiedFiles\",\n                \"elapsed_time\": 8947,\n                \"description\": \"Checks that no files installed via RPM in the base Red Hat layer have been modified\"\n            },\n            {\n                \"name\": \"BasedOnUbi\",\n                \"elapsed_time\": 630,\n                \"description\": \"Checking if the container's base image is based upon the Red Hat Universal Base Image (UBI)\"\n            }\n        ],\n        \"failed\": [\n            {\n                \"name\": \"HasLicense\",\n                \"elapsed_time\": 0,\n                \"description\": \"Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses\",\n                \"help\": \"Check HasLicense encountered an error. Please review the preflight.log file for more information.\",\n                \"suggestion\": \"Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.\",\n                \"knowledgebase_url\": \"https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction\",\n                \"check_url\": \"https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction\"\n            }\n        ],\n        \"errors\": []\n    }\n}\ntime=\"2026-04-20T17:39:29Z\" level=info msg=\"Preflight result: FAILED\"\n\npod: test-comp-pac-gitlab-jibnbb2e4068001f7a64281751876b6bdec9f5-pod | container step-app-set-outcome: \n{\"result\":\"FAILURE\",\"timestamp\":\"1776706770\",\"note\":\"Task preflight is a FAILURE: Refer to Tekton task logs for more information\",\"successes\":7,\"failures\":1,\"warnings\":0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e378f362e1b4f61f636d7872b306807d05b0f496\n\npod: test-comp-pac-gitlab-jibnbb2e4068001f7a64281751876b6bdec9f5-pod | container step-final-outcome: \n+ [[ ! -f /mount/konflux.results.json ]]\n+ tee /tekton/steps/step-final-outcome/results/test-output\n{\"result\":\"FAILURE\",\"timestamp\":\"1776706770\",\"note\":\"Task preflight is a FAILURE: Refer to Tekton task logs for more information\",\"successes\":7,\"failures\":1,\"warnings\":0}\n pod: test-comp-pac-gitlab-jibnbbab72785f61629772d563bf6e9a2fdda4-pod | init container: prepare\n2026/04/20 17:38:32 Entrypoint initialization\n\npod: test-comp-pac-gitlab-jibnbbab72785f61629772d563bf6e9a2fdda4-pod | container step-apply-additional-tags: \ntime=\"2026-04-20T17:38:35Z\" level=info msg=\"[param] image-url: quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e378f362e1b4f61f636d7872b306807d05b0f496\"\ntime=\"2026-04-20T17:38:35Z\" level=info msg=\"[param] digest: sha256:f812d66e5015b154031a7f3b11ededb252cd263e2f2d52539646b1457d7e9324\"\ntime=\"2026-04-20T17:38:35Z\" level=info msg=\"[param] tags-from-image-label: konflux.additional-tags\"\ntime=\"2026-04-20T17:38:36Z\" level=warning msg=\"No tags given in 'konflux.additional-tags' image label\"\n{\"tags\":[]}\n pod: test-comp-pac-gitlab-jibnbbef334c3b17f458511eea4fe9b5be1523-pod | init container: prepare\n2026/04/20 17:38:32 Entrypoint initialization\n\n pod: test-comp-pac-gitlab-jibnbbef334c3b17f458511eea4fe9b5be1523-pod | init container: place-scripts\n2026/04/20 17:38:33 Decoded script /tekton/scripts/script-0-gm2d5\n2026/04/20 17:38:33 Decoded script /tekton/scripts/script-1-7nhvc\n\npod: test-comp-pac-gitlab-jibnbbef334c3b17f458511eea4fe9b5be1523-pod | container step-extract-and-scan-image: \nStarting clamd ...\nclamd is ready!\nDetecting artifact type for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb@sha256:f812d66e5015b154031a7f3b11ededb252cd263e2f2d52539646b1457d7e9324.\nDetected container image. Processing image manifests.\nRunning \"oc image extract\" on image of arch amd64\nScanning image for arch amd64. This operation may take a while.\n\n----------- SCAN SUMMARY -----------\nInfected files: 0\nTime: 43.722 sec (0 m 43 s)\nStart Date: 2026:04:20 17:39:15\nEnd Date:   2026:04:20 17:39:59\nExecuted-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27977/Mon Apr 20 06:26:26 2026 Database version: 27977\n[\n\t{\n\t\t\"filename\": \"/work/logs/clamscan-result-log-amd64.json\",\n\t\t\"namespace\": \"required_checks\",\n\t\t\"successes\": 2\n\t}\n]\n{\"timestamp\":\"1776706799\",\"namespace\":\"required_checks\",\"successes\":2,\"failures\":0,\"warnings\":0,\"result\":\"SUCCESS\",\"note\":\"All checks passed successfully\"}\n{\"timestamp\":\"1776706799\",\"namespace\":\"required_checks\",\"successes\":2,\"failures\":0,\"warnings\":0,\"result\":\"SUCCESS\",\"note\":\"All checks passed successfully\"}\n{\"timestamp\":\"1776706799\",\"namespace\":\"required_checks\",\"successes\":2,\"failures\":0,\"warnings\":0,\"result\":\"SUCCESS\",\"note\":\"All checks passed successfully\"}\n{\"image\": {\"pullspec\": \"quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e378f362e1b4f61f636d7872b306807d05b0f496\", \"digests\": [\"sha256:f812d66e5015b154031a7f3b11ededb252cd263e2f2d52539646b1457d7e9324\"]}}\n\npod: test-comp-pac-gitlab-jibnbbef334c3b17f458511eea4fe9b5be1523-pod | container step-upload: \nSelecting auth\nUsing token for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb\nAttaching to quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e378f362e1b4f61f636d7872b306807d05b0f496\nExecuting: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e378f362e1b4f61f636d7872b306807d05b0f496@sha256:f812d66e5015b154031a7f3b11ededb252cd263e2f2d52539646b1457d7e9324 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json\nPreparing clamscan-result-amd64.log\nPreparing clamscan-ec-test-amd64.json\nUploading d335ee627c85 clamscan-ec-test-amd64.json\nUploading d6674ee4eac6 clamscan-result-amd64.log\nExists    44136fa355b3 application/vnd.oci.empty.v1+json\nUploaded  d6674ee4eac6 clamscan-result-amd64.log\nUploaded  d335ee627c85 clamscan-ec-test-amd64.json\nUploading 69c303f94fa7 application/vnd.oci.image.manifest.v1+json\nUploaded  69c303f94fa7 application/vnd.oci.image.manifest.v1+json\nAttached to [registry] quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-e378f362e1b4f61f636d7872b306807d05b0f496@sha256:f812d66e5015b154031a7f3b11ededb252cd263e2f2d52539646b1457d7e9324\nDigest: sha256:69c303f94fa7ad6c51e683912396d5d25cdd1a2519ebda939e38d124aea23ac6\nNew PipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd found after retrigger for component gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd found for Component gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd reason: Running\nPipelineRun test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd reason: Failed\nan error happened during storing pipelineRun log gitlab-rep-hzqs:test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd: container \"step-get-vulnerabilities\" in pod \"test-comp-pac-gitlab-jibnbb490aa52eaed744434014e2a783066e0e-pod\" is waiting to start: trying and failing to pull image\nfailed to get logs for PipelineRun gitlab-rep-hzqs:test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd: container \"step-get-vulnerabilities\" in pod \"test-comp-pac-gitlab-jibnbb490aa52eaed744434014e2a783066e0e-pod\" is waiting to start: trying and failing to pull image\nattempt 3/3: PipelineRun \"test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd\" failed: \n pod: test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd-init-pod | init container: prepare\n2026/04/20 17:40:29 Entrypoint initialization\n\npod: test-comp-pac-gitlab-jibnbb-on-pull-request-b8ctd-init-pod | container step-init: \ntime=\"2026-04-20T17:40:31Z\" level=info msg=\"Using in-cluster config\" logger=KubeClient\ntime=\"2026-04-20T17:40:31Z\" level=info msg=\"[param] enable: false\"\ntime=\"2026-04-20T17:40:31Z\" level=info msg=\"[param] default-http-proxy: squid.caching.svc.cluster.local:3128\"\ntime=\"2026-04-20T17:40:31Z\" level=info msg=\"[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\"\ntime=\"2026-04-20T17:40:31Z\" level=info msg=\"[param] http-proxy-result-path: /tekton/results/http-proxy\"\ntime=\"2026-04-20T17:40:31Z\" level=info msg=\"[param] no-proxy-result-path: /tekton/results/no-proxy\"\ntime=\"2026-04-20T17:40:31Z\" level=info msg=\"Cache proxy is disabled in param or in backend\"\ntime=\"2026-04-20T17:40:31Z\" level=info msg=\"[result] HTTP PROXY: \"\ntime=\"2026-04-20T17:40:31Z\" level=info msg=\"[result] NO PROXY: \"\n\n pod: test-comp-pac-gitlab-jibnbb1cf706c1a50543d374919dfe4da41e13-pod | init container: prepare\n2026/04/20 17:42:15 Entrypoint initialization\n\n pod: test-comp-pac-gitlab-jibnbb1cf706c1a50543d374919dfe4da41e13-pod | init container: place-scripts\n2026/04/20 17:42:16 Decoded script /tekton/scripts/script-0-c9pnh\n2026/04/20 17:42:16 Decoded script /tekton/scripts/script-1-h98qx\n\npod: test-comp-pac-gitlab-jibnbb1cf706c1a50543d374919dfe4da41e13-pod | container step-extract-and-scan-image: \nStarting clamd ...\nclamd is ready!\nDetecting artifact type for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb@sha256:711c5a03b75e34a917b3871baf41335c4ada2e2e24813c2f9e62e7dbc0c29350.\nDetected container image. Processing image manifests.\nRunning \"oc image extract\" on image of arch amd64\nScanning image for arch amd64. This operation may take a while.\n\n----------- SCAN SUMMARY -----------\nInfected files: 0\nTime: 45.735 sec (0 m 45 s)\nStart Date: 2026:04:20 17:42:35\nEnd Date:   2026:04:20 17:43:20\nExecuted-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27977/Mon Apr 20 06:26:26 2026 Database version: 27977\n[\n\t{\n\t\t\"filename\": \"/work/logs/clamscan-result-log-amd64.json\",\n\t\t\"namespace\": \"required_checks\",\n\t\t\"successes\": 2\n\t}\n]\n{\"timestamp\":\"1776707000\",\"namespace\":\"required_checks\",\"successes\":2,\"failures\":0,\"warnings\":0,\"result\":\"SUCCESS\",\"note\":\"All checks passed successfully\"}\n{\"timestamp\":\"1776707000\",\"namespace\":\"required_checks\",\"successes\":2,\"failures\":0,\"warnings\":0,\"result\":\"SUCCESS\",\"note\":\"All checks passed successfully\"}\n{\"timestamp\":\"1776707000\",\"namespace\":\"required_checks\",\"successes\":2,\"failures\":0,\"warnings\":0,\"result\":\"SUCCESS\",\"note\":\"All checks passed successfully\"}\n{\"image\": {\"pullspec\": \"quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\", \"digests\": [\"sha256:711c5a03b75e34a917b3871baf41335c4ada2e2e24813c2f9e62e7dbc0c29350\"]}}\n\npod: test-comp-pac-gitlab-jibnbb1cf706c1a50543d374919dfe4da41e13-pod | container step-upload: \nSelecting auth\nUsing token for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb\nAttaching to quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\nExecuting: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423@sha256:711c5a03b75e34a917b3871baf41335c4ada2e2e24813c2f9e62e7dbc0c29350 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json\nPreparing clamscan-result-amd64.log\nPreparing clamscan-ec-test-amd64.json\nExists    44136fa355b3 application/vnd.oci.empty.v1+json\nUploading d69762e0a313 clamscan-result-amd64.log\nUploading 02917e8a7c2a clamscan-ec-test-amd64.json\nUploaded  02917e8a7c2a clamscan-ec-test-amd64.json\nUploaded  d69762e0a313 clamscan-result-amd64.log\nUploading 4d89f12578e3 application/vnd.oci.image.manifest.v1+json\nUploaded  4d89f12578e3 application/vnd.oci.image.manifest.v1+json\nAttached to [registry] quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423@sha256:711c5a03b75e34a917b3871baf41335c4ada2e2e24813c2f9e62e7dbc0c29350\nDigest: sha256:4d89f12578e3c52a4088e8122bbb057076b541ff85885a61217ea5bff3ca432c\n\n pod: test-comp-pac-gitlab-jibnbb376cc194da8af1dedbf1fb9890f267fb-pod | init container: prepare\n2026/04/20 17:42:16 Entrypoint initialization\n\npod: test-comp-pac-gitlab-jibnbb376cc194da8af1dedbf1fb9890f267fb-pod | container step-apply-additional-tags: \ntime=\"2026-04-20T17:42:19Z\" level=info msg=\"[param] image-url: quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\"\ntime=\"2026-04-20T17:42:19Z\" level=info msg=\"[param] digest: sha256:711c5a03b75e34a917b3871baf41335c4ada2e2e24813c2f9e62e7dbc0c29350\"\ntime=\"2026-04-20T17:42:19Z\" level=info msg=\"[param] tags-from-image-label: konflux.additional-tags\"\ntime=\"2026-04-20T17:42:20Z\" level=warning msg=\"No tags given in 'konflux.additional-tags' image label\"\n{\"tags\":[]}\n pod: test-comp-pac-gitlab-jibnbb3a85f38965c3241201aff1e2c27c31f4-pod | init container: prepare\n2026/04/20 17:42:16 Entrypoint initialization\n\n pod: test-comp-pac-gitlab-jibnbb3a85f38965c3241201aff1e2c27c31f4-pod | init container: place-scripts\n2026/04/20 17:42:17 Decoded script /tekton/scripts/script-0-k54k2\n2026/04/20 17:42:17 Decoded script /tekton/scripts/script-1-qh2sx\n2026/04/20 17:42:17 Decoded script /tekton/scripts/script-2-49b85\n2026/04/20 17:42:17 Decoded script /tekton/scripts/script-3-hdm56\n2026/04/20 17:42:17 Decoded script /tekton/scripts/script-4-72hsx\n2026/04/20 17:42:17 Decoded script /tekton/scripts/script-5-rhrst\n\npod: test-comp-pac-gitlab-jibnbb3a85f38965c3241201aff1e2c27c31f4-pod | container step-introspect: \nArtifact type will be determined by introspection.\nChecking the media type of the OCI artifact...\n[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\nThe media type of the OCI artifact is application/vnd.docker.distribution.manifest.v2+json.\nLooking for image labels that indicate this might be an operator bundle...\n[retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\nFound 0 matching labels.\nExpecting 3 or more to identify this image as an operator bundle.\nIntrospection concludes that this artifact is of type \"application\".\n\npod: test-comp-pac-gitlab-jibnbb3a85f38965c3241201aff1e2c27c31f4-pod | container step-generate-container-auth: \nSelecting auth for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\nUsing token for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb\nAuth json written to \"/auth/auth.json\".\n\npod: test-comp-pac-gitlab-jibnbb3a85f38965c3241201aff1e2c27c31f4-pod | container step-set-skip-for-bundles: \n2026/04/20 17:42:41 INFO Step was skipped due to when expressions were evaluated to false.\n\npod: test-comp-pac-gitlab-jibnbb3a85f38965c3241201aff1e2c27c31f4-pod | container step-app-check: \ntime=\"2026-04-20T17:42:42Z\" level=info msg=\"certification library version\" version=\"1.17.1 \u003ccommit: f7de82ae1c76e6c10ea94967d6b6a66f96248cbe\u003e\"\ntime=\"2026-04-20T17:42:42Z\" level=info msg=\"running checks for quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423 for platform amd64\"\ntime=\"2026-04-20T17:42:42Z\" level=info msg=\"target image\" image=\"quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\"\ntime=\"2026-04-20T17:42:49Z\" level=info msg=\"warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-1085214495/fs/licenses: no such file or directory\" check=HasLicense\ntime=\"2026-04-20T17:42:49Z\" level=info msg=\"check completed\" check=HasLicense result=FAILED\ntime=\"2026-04-20T17:42:49Z\" level=info msg=\"check completed\" check=HasUniqueTag result=PASSED\ntime=\"2026-04-20T17:42:49Z\" level=info msg=\"check completed\" check=LayerCountAcceptable result=PASSED\ntime=\"2026-04-20T17:42:49Z\" level=info msg=\"check completed\" check=HasNoProhibitedPackages result=PASSED\ntime=\"2026-04-20T17:42:49Z\" level=info msg=\"check completed\" check=HasRequiredLabel result=PASSED\ntime=\"2026-04-20T17:42:49Z\" level=info msg=\"USER 185 specified that is non-root\" check=RunAsNonRoot\ntime=\"2026-04-20T17:42:49Z\" level=info msg=\"check completed\" check=RunAsNonRoot result=PASSED\ntime=\"2026-04-20T17:42:58Z\" level=info msg=\"check completed\" check=HasModifiedFiles result=PASSED\ntime=\"2026-04-20T17:42:58Z\" level=info msg=\"check completed\" check=BasedOnUbi result=PASSED\ntime=\"2026-04-20T17:42:58Z\" level=info msg=\"This image's tag on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423 will be paired with digest sha256:711c5a03b75e34a917b3871baf41335c4ada2e2e24813c2f9e62e7dbc0c29350 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.\"\n{\n    \"image\": \"quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\",\n    \"passed\": false,\n    \"test_library\": {\n        \"name\": \"github.com/redhat-openshift-ecosystem/openshift-preflight\",\n        \"version\": \"1.17.1\",\n        \"commit\": \"f7de82ae1c76e6c10ea94967d6b6a66f96248cbe\"\n    },\n    \"results\": {\n        \"passed\": [\n            {\n                \"name\": \"HasUniqueTag\",\n                \"elapsed_time\": 0,\n                \"description\": \"Checking if container has a tag other than 'latest', so that the image can be uniquely identified.\"\n            },\n            {\n                \"name\": \"LayerCountAcceptable\",\n                \"elapsed_time\": 0,\n                \"description\": \"Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.\"\n            },\n            {\n                \"name\": \"HasNoProhibitedPackages\",\n                \"elapsed_time\": 36,\n                \"description\": \"Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.\"\n            },\n            {\n                \"name\": \"HasRequiredLabel\",\n                \"elapsed_time\": 0,\n                \"description\": \"Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata\"\n            },\n            {\n                \"name\": \"RunAsNonRoot\",\n                \"elapsed_time\": 0,\n                \"description\": \"Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication\"\n            },\n            {\n                \"name\": \"HasModifiedFiles\",\n                \"elapsed_time\": 8261,\n                \"description\": \"Checks that no files installed via RPM in the base Red Hat layer have been modified\"\n            },\n            {\n                \"name\": \"BasedOnUbi\",\n                \"elapsed_time\": 387,\n                \"description\": \"Checking if the container's base image is based upon the Red Hat Universal Base Image (UBI)\"\n            }\n        ],\n        \"failed\": [\n            {\n                \"name\": \"HasLicense\",\n                \"elapsed_time\": 0,\n                \"description\": \"Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses\",\n                \"help\": \"Check HasLicense encountered an error. Please review the preflight.log file for more information.\",\n                \"suggestion\": \"Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.\",\n                \"knowledgebase_url\": \"https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction\",\n                \"check_url\": \"https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction\"\n            }\n        ],\n        \"errors\": []\n    }\n}\ntime=\"2026-04-20T17:42:58Z\" level=info msg=\"Preflight result: FAILED\"\n\npod: test-comp-pac-gitlab-jibnbb3a85f38965c3241201aff1e2c27c31f4-pod | container step-app-set-outcome: \n{\"result\":\"FAILURE\",\"timestamp\":\"1776706979\",\"note\":\"Task preflight is a FAILURE: Refer to Tekton task logs for more information\",\"successes\":7,\"failures\":1,\"warnings\":0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-hzqs/test-comp-pac-gitlab-jibnbb:on-pr-9c0b8cb00d5ce53a05889e8371b657d137b91423\n\npod: test-comp-pac-gitlab-jibnbb3a85f38965c3241201aff1e2c27c31f4-pod | container step-final-outcome: \n+ [[ ! -f /mount/konflux.results.json ]]\n+ tee /tekton/steps/step-final-outcome/results/test-output\n{\"result\":\"FAILURE\",\"timestamp\":\"1776706979\",\"note\":\"Task preflight is a FAILURE: Refer to Tekton task logs for more information\",\"successes\":7,\"failures\":1,\"warnings\":0}\n pod: test-comp-pac-gitlab-jibnbb490aa52eaed744434014e2a783066e0e-pod | init container: prepare\n2026/04/20 17:42:15 Entrypoint initialization\n\n pod: test-comp-pac-gitlab-jibnbb490aa52eaed744434014e2a783066e0e-pod | init container: place-scripts\n2026/04/20 17:42:15 Decoded script /tekton/scripts/script-0-4xq98\n2026/04/20 17:42:15 Decoded script /tekton/scripts/script-1-mb7wc\n2026/04/20 17:42:15 Decoded script /tekton/scripts/script-2-c2hsp\n2026/04/20 17:42:15 Decoded script /tekton/scripts/script-3-vvk6b\n\npod: test-comp-pac-gitlab-jibnbb490aa52eaed744434014e2a783066e0e-pod | container step-get-image-manifests: \n\npod: test-comp-pac-gitlab-jibnbb490aa52eaed744434014e2a783066e0e-pod | container step-get-vulnerabilities: \n",
        "AdditionalFailures": [
          {
            "State": "failed",
            "Failure": {
              "Message": "Expected success, but got an error:\n    \u003c*errors.errorString | 0xc0022ab520\u003e: \n    failed to get MR of IID 0 in projectID konflux-qe/hacbs-test-project-integration, 404 Not Found\n    {\n        s: \"failed to get MR of IID 0 in projectID konflux-qe/hacbs-test-project-integration, 404 Not Found\",\n    }",
              "Location": {
                "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
                "LineNumber": 97,
                "FullStackTrace": "github.com/konflux-ci/e2e-tests/tests/integration-service.init.func2.1.2()\n\t/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go:97 +0xa3"
              },
              "TimelineLocation": {
                "Offset": 47810,
                "Order": 23,
                "Time": "2026-04-20T17:43:30.370917675Z"
              },
              "FailureNodeContext": "in-container",
              "FailureNodeType": "AfterAll",
              "FailureNodeLocation": {
                "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
                "LineNumber": 94
              },
              "FailureNodeContainerIndex": 1,
              "ProgressReport": {
                "LeafNodeLocation": {},
                "SpecStartTime": "0001-01-01T00:00:00Z",
                "CurrentNodeLocation": {},
                "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
                "CurrentStepLocation": {},
                "CurrentStepStartTime": "0001-01-01T00:00:00Z",
                "TimelineLocation": {
                  "Time": "0001-01-01T00:00:00Z"
                }
              }
            }
          }
        ],
        "SpecEvents": [
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 148
            },
            "TimelineLocation": {
              "Order": 19,
              "Time": "2026-04-20T17:30:46.151919809Z"
            },
            "Message": "should lead to build PipelineRun finishing successfully",
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 148
            },
            "TimelineLocation": {
              "Offset": 47810,
              "Order": 21,
              "Time": "2026-04-20T17:43:30.191279449Z"
            },
            "Message": "should lead to build PipelineRun finishing successfully",
            "Duration": 764039359640,
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 94
            },
            "TimelineLocation": {
              "Offset": 47810,
              "Order": 22,
              "Time": "2026-04-20T17:43:30.191480745Z"
            },
            "Message": "Gitlab with status reporting of Integration tests in the assosiated merge request",
            "NodeType": "AfterAll"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 94
            },
            "TimelineLocation": {
              "Offset": 47810,
              "Order": 24,
              "Time": "2026-04-20T17:43:30.370948286Z"
            },
            "Message": "Gitlab with status reporting of Integration tests in the assosiated merge request",
            "Duration": 179467541,
            "NodeType": "AfterAll"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 42
            },
            "TimelineLocation": {
              "Offset": 47810,
              "Order": 25,
              "Time": "2026-04-20T17:43:30.371171212Z"
            },
            "Message": "[integration-service-suite Gitlab Status Reporting of Integration tests]",
            "NodeType": "AfterEach"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
              "LineNumber": 42
            },
            "TimelineLocation": {
              "Offset": 47810,
              "Order": 27,
              "Time": "2026-04-20T17:43:30.604863821Z"
            },
            "Message": "[integration-service-suite Gitlab Status Reporting of Integration tests]",
            "Duration": 233692610,
            "NodeType": "AfterEach"
          }
        ]
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 108
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          [
            "custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 153
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should have a related PaC init MR is created",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.60602617Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 153
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 28,
            "Time": "2026-04-20T17:43:30.606024821Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 153
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 108
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          [
            "custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 172
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "the PipelineRun should eventually finish successfully for component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.606296907Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 172
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 29,
            "Time": "2026-04-20T17:43:30.606295867Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 172
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when the PaC build pipelineRun run succeeded"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 178
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 179
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "checks if the BuildPipelineRun have the annotation of chains signed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.606551774Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 179
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 30,
            "Time": "2026-04-20T17:43:30.606550874Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 179
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when the PaC build pipelineRun run succeeded"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 178
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 183
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "checks if the Snapshot is created",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.606743789Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 183
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 31,
            "Time": "2026-04-20T17:43:30.606742589Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 183
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when the PaC build pipelineRun run succeeded"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 178
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 188
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "checks if the Build PipelineRun got annotated with Snapshot name",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.606921573Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 188
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 32,
            "Time": "2026-04-20T17:43:30.606920773Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 188
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when the Snapshot was created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 193
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 194
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should find the Integration Test Scenario PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.607163019Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 194
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 33,
            "Time": "2026-04-20T17:43:30.607161809Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 194
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when Integration PipelineRun is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 205
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 207
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should eventually complete successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.607353584Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 207
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 34,
            "Time": "2026-04-20T17:43:30.607352584Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 207
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when Integration PipelineRun is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 205
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 212
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.607540819Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 212
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 35,
            "Time": "2026-04-20T17:43:30.607539429Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 212
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when Integration PipelineRun is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 205
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 229
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to the integration test PipelineRun's Pass status reported at MR commit status",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.607706513Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 229
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 36,
            "Time": "2026-04-20T17:43:30.607705393Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 229
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when Integration PipelineRun is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 205
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 233
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.607872337Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 233
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 37,
            "Time": "2026-04-20T17:43:30.607871397Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 233
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when Integration PipelineRun is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 205
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 250
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to the integration test PipelineRun's Fail status reported at MR commit status",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.608069153Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 250
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 38,
            "Time": "2026-04-20T17:43:30.608068222Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 250
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when Integration PipelineRun is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 205
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 254
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "validates at least one MR note contains the final integration test result",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.608228126Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 254
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 39,
            "Time": "2026-04-20T17:43:30.608227337Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 254
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when Integration PipelineRun is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 205
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 278
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "merging the PR should be successful",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.60838453Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 278
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 40,
            "Time": "2026-04-20T17:43:30.608383681Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 278
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when Integration PipelineRun is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 205
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 288
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "leads to triggering on push PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.608552905Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 288
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 41,
            "Time": "2026-04-20T17:43:30.608551705Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 288
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when Run integration tests after Merged MR"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 303
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should eventually complete successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.60873545Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 303
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 42,
            "Time": "2026-04-20T17:43:30.60873439Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 303
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when Run integration tests after Merged MR"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 308
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.608902244Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 308
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 43,
            "Time": "2026-04-20T17:43:30.608901314Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 308
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when Run integration tests after Merged MR"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 325
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to the integration test PipelineRun's Pass status reported at MR commit status",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.609115209Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 325
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 44,
            "Time": "2026-04-20T17:43:30.609113809Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 325
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when Run integration tests after Merged MR"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 329
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.609272723Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 329
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 45,
            "Time": "2026-04-20T17:43:30.609271643Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 329
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Gitlab Status Reporting of Integration tests]",
          "Gitlab with status reporting of Integration tests in the assosiated merge request",
          "when Run integration tests after Merged MR"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 302
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "gitlab-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
          "LineNumber": 346
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to the integration test PipelineRun's Fail status reported at MR commit status",
        "State": "skipped",
        "StartTime": "2026-04-20T17:43:30.609431767Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 16,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 346
          },
          "TimelineLocation": {
            "Offset": 47810,
            "Order": 46,
            "Time": "2026-04-20T17:43:30.609430827Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/gitlab-integration-reporting.go",
            "LineNumber": 346
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[enterprise-contract-suite Conforma E2E tests]",
          "infrastructure is running"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 42
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "ec"
          ],
          [
            "pipeline"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
          "LineNumber": 43
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies if the chains controller is running",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.959999438Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[enterprise-contract-suite Conforma E2E tests]",
          "infrastructure is running"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 42
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "ec"
          ],
          [
            "pipeline"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
          "LineNumber": 48
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies the signing secret is present",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:40.961055026Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[enterprise-contract-suite Conforma E2E tests]",
          "test creating and signing an image and task"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 65
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "ec"
          ],
          [
            "pipeline"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
          "LineNumber": 115
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates signature and attestation",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.056149128Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[enterprise-contract-suite Conforma E2E tests]",
          "test creating and signing an image and task",
          "verify-enterprise-contract task"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 65
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 127
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "ec"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
          "LineNumber": 177
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "succeeds when policy is met",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.056564169Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[enterprise-contract-suite Conforma E2E tests]",
          "test creating and signing an image and task",
          "verify-enterprise-contract task"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 65
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 127
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "ec"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
          "LineNumber": 197
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "does not pass when tests are not satisfied on non-strict mode",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.057249897Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[enterprise-contract-suite Conforma E2E tests]",
          "test creating and signing an image and task",
          "verify-enterprise-contract task"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 65
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 127
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "ec"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
          "LineNumber": 225
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "fails when tests are not satisfied on strict mode",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.058762207Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[enterprise-contract-suite Conforma E2E tests]",
          "test creating and signing an image and task",
          "verify-enterprise-contract task"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 65
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 127
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "ec"
          ],
          [
            "pipeline"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
          "LineNumber": 251
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "fails when unexpected signature is used",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.059318312Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[enterprise-contract-suite Conforma E2E tests]",
          "test creating and signing an image and task",
          "verify-enterprise-contract task",
          "ec-cli command"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 65
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 127
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 278
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "ec"
          ],
          [
            "pipeline"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
          "LineNumber": 279
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies ec cli has error handling",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.059798925Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[enterprise-contract-suite Conforma E2E tests]",
          "test creating and signing an image and task",
          "verify-enterprise-contract task",
          "ec-cli command"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 65
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 127
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 278
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "ec"
          ],
          [
            "pipeline"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
          "LineNumber": 301
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies ec validate accepts a list of image references",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.060426622Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[enterprise-contract-suite Conforma E2E tests]",
          "test creating and signing an image and task",
          "verify-enterprise-contract task",
          "Release Policy"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 65
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 127
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 344
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "ec"
          ],
          [
            "pipeline"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
          "LineNumber": 345
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies redhat products pass the redhat policy rule collection before release ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.06075857Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[enterprise-contract-suite Conforma E2E tests]",
          "test creating and signing an image and task",
          "verify-enterprise-contract task",
          "Release Policy"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 65
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 127
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 344
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "ec"
          ],
          [
            "pipeline"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
          "LineNumber": 382
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies the release policy: Task are trusted",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.061172381Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[enterprise-contract-suite Conforma E2E tests]",
          "test creating and signing an image and task",
          "verify-enterprise-contract task",
          "Release Policy"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 33
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 65
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 127
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
            "LineNumber": 344
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "ec"
          ],
          [
            "pipeline"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/enterprise-contract/contract.go",
          "LineNumber": 422
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies the release policy: Task references are pinned",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.06149117Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 108
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          [
            "custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 109
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "does not contain an annotation with a Snapshot Name",
        "State": "failed",
        "StartTime": "2026-04-20T17:29:41.06226321Z",
        "EndTime": "2026-04-20T17:45:06.998224747Z",
        "RunTime": 925935961527,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Timed out after 900.001s.\ntimed out when waiting for the build PipelineRun to start for the component stat-rep-vlpa/test-component-pac-tzubvo\nExpected success, but got an error:\n    \u003c*errors.errorString | 0xc00138a300\u003e: \n    no pipelinerun found for component test-component-pac-tzubvo\n    {\n        s: \"no pipelinerun found for component test-component-pac-tzubvo\",\n    }",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 86,
            "FullStackTrace": "github.com/konflux-ci/e2e-tests/tests/integration-service.init.func5.1.1()\n\t/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go:86 +0xbca"
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 2,
            "Time": "2026-04-20T17:45:05.990203152Z"
          },
          "FailureNodeContext": "in-container",
          "FailureNodeType": "BeforeAll",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 45
          },
          "FailureNodeContainerIndex": 1,
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 1,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0,
        "CapturedGinkgoWriterOutput": "Image repository for component test-component-pac-tzubvo in namespace stat-rep-vlpa do not have right state ('' != 'ready') yet but it has status {  { } {\u003cnil\u003e      } []}.\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\nBuild PipelineRun has not been created yet for the component stat-rep-vlpa/test-component-pac-tzubvo\n",
        "SpecEvents": [
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
              "LineNumber": 45
            },
            "TimelineLocation": {
              "Order": 1,
              "Time": "2026-04-20T17:29:41.062494177Z"
            },
            "Message": "with status reporting of Integration tests in CheckRuns",
            "NodeType": "BeforeAll"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
              "LineNumber": 45
            },
            "TimelineLocation": {
              "Offset": 4717,
              "Order": 3,
              "Time": "2026-04-20T17:45:05.990215263Z"
            },
            "Message": "with status reporting of Integration tests in CheckRuns",
            "Duration": 924927721077,
            "NodeType": "BeforeAll"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
              "LineNumber": 92
            },
            "TimelineLocation": {
              "Offset": 4717,
              "Order": 4,
              "Time": "2026-04-20T17:45:05.990469989Z"
            },
            "Message": "with status reporting of Integration tests in CheckRuns",
            "NodeType": "AfterAll"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
              "LineNumber": 92
            },
            "TimelineLocation": {
              "Offset": 4717,
              "Order": 6,
              "Time": "2026-04-20T17:45:06.84987217Z"
            },
            "Message": "with status reporting of Integration tests in CheckRuns",
            "Duration": 859402221,
            "NodeType": "AfterAll"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
              "LineNumber": 42
            },
            "TimelineLocation": {
              "Offset": 4717,
              "Order": 7,
              "Time": "2026-04-20T17:45:06.850171498Z"
            },
            "Message": "[integration-service-suite Status Reporting of Integration tests]",
            "NodeType": "AfterEach"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
              "LineNumber": 42
            },
            "TimelineLocation": {
              "Offset": 4717,
              "Order": 9,
              "Time": "2026-04-20T17:45:06.998216797Z"
            },
            "Message": "[integration-service-suite Status Reporting of Integration tests]",
            "Duration": 148045269,
            "NodeType": "AfterEach"
          }
        ]
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 108
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          [
            "custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 113
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should have a related PaC init PR created",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:06.998820572Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 113
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 10,
            "Time": "2026-04-20T17:45:06.998817302Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 113
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 108
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          [
            "custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 132
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "initialized integration test status is reported to github",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:06.999179172Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 132
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 11,
            "Time": "2026-04-20T17:45:06.999176572Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 132
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 108
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          [
            "custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 142
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to build PipelineRun finishing successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:06.99950348Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 142
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 12,
            "Time": "2026-04-20T17:45:06.99950151Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 142
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when the PaC build pipelineRun run succeeded"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 148
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 149
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "checks if the BuildPipelineRun have the annotation of chains signed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:06.999815328Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 149
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 13,
            "Time": "2026-04-20T17:45:06.999813368Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 149
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when the PaC build pipelineRun run succeeded"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 148
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 153
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "checks if the Snapshot is created",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.000132386Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 153
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 14,
            "Time": "2026-04-20T17:45:07.000131426Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 153
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when the PaC build pipelineRun run succeeded"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 148
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 158
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "checks if the Build PipelineRun got annotated with Snapshot name",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.000328231Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 158
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 15,
            "Time": "2026-04-20T17:45:07.000327402Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 158
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when the Snapshot was created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 163
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 164
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should find both the related Integration PipelineRuns",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.000521576Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 164
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 16,
            "Time": "2026-04-20T17:45:07.000520627Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 164
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when Integration PipelineRuns are created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 182
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 183
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should eventually complete successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.000710481Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 183
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 17,
            "Time": "2026-04-20T17:45:07.000709551Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 183
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when Integration PipelineRuns completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 190
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 191
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to Snapshot CR being marked as failed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.000896206Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 191
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 18,
            "Time": "2026-04-20T17:45:07.000895376Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 191
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 3,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when Integration PipelineRuns completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 190
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 205
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to the status reported at Checks tab for the successful Integration PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.001104211Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 205
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 19,
            "Time": "2026-04-20T17:45:07.001103191Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 205
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when Integration PipelineRuns completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 190
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 209
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to the status reported at Checks tab for the failed Integration PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.001283646Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 209
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 20,
            "Time": "2026-04-20T17:45:07.001282756Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 209
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when Integration PipelineRuns completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 190
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 213
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to the status reported at Checks tab for the optional Integration PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.00145222Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 213
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 21,
            "Time": "2026-04-20T17:45:07.00145119Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 213
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when Integration PipelineRuns completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 190
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 217
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "checks if the optional Integration Test Scenario status is reported in the Snapshot",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.001615275Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 217
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 22,
            "Time": "2026-04-20T17:45:07.001614395Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 217
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when Integration PipelineRuns completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 190
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 232
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "checks if the finalizer was removed from the optional Integration PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.001783669Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 232
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 23,
            "Time": "2026-04-20T17:45:07.001782739Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 232
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when Integration PipelineRuns completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 190
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 236
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "merging the PR, expected to succeed ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.001976344Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 236
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 24,
            "Time": "2026-04-20T17:45:07.001975324Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 236
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when Integration PipelineRuns completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 190
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 245
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "leads to triggering a push PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.002156049Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 245
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 25,
            "Time": "2026-04-20T17:45:07.002155189Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 245
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when Integration PipelineRuns completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 190
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 260
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that Push PipelineRuns completed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.002325053Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 260
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 26,
            "Time": "2026-04-20T17:45:07.002324173Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 260
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when Integration PipelineRuns completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 190
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 265
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "validates the Integration test scenario PipelineRun is reported to merge request CheckRuns, and it pass",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.002489657Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 265
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 27,
            "Time": "2026-04-20T17:45:07.002488807Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 265
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when Integration PipelineRuns completes successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 190
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 270
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to the status reported at Checks tab for the failed Integration PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.002658922Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 270
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 28,
            "Time": "2026-04-20T17:45:07.002657751Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 270
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when The git-provider annotation is missing"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 275
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 276
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should set the git-reporting-failure annotation correctly",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.002822806Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 276
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 29,
            "Time": "2026-04-20T17:45:07.002821886Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 276
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when build pipelinerun fails"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 322
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 323
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "build pipelinerun is created but fails",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.00300704Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 323
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 30,
            "Time": "2026-04-20T17:45:07.003006051Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 323
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Status Reporting of Integration tests]",
          "with status reporting of Integration tests in CheckRuns",
          "when build pipelinerun fails"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 44
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 322
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "github-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
          "LineNumber": 368
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "build pipelinerun failure is reported to integration test checkRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:07.003186355Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 2,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 368
          },
          "TimelineLocation": {
            "Offset": 4717,
            "Order": 31,
            "Time": "2026-04-20T17:45:07.003185555Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/status-reporting-to-pullrequest.go",
            "LineNumber": 368
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when we start creation of a new Component A"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 204
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 205
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates the Component A successfully",
        "State": "passed",
        "StartTime": "2026-04-20T17:29:40.860693064Z",
        "EndTime": "2026-04-20T17:30:15.676194527Z",
        "RunTime": 34815501462,
        "ParallelProcess": 14,
        "NumAttempts": 1,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0,
        "CapturedGinkgoWriterOutput": "Successfully acquired repository lock for namespace group-hphn\nImage repository for component go-component-kqoggz in namespace group-hphn do not have right state ('' != 'ready') yet but it has status {  { } {\u003cnil\u003e      } []}.\nImage repository for component go-component-kqoggz in namespace group-hphn do not have right state ('' != 'ready') yet but it has status {  { } {\u003cnil\u003e      } []}.\nImage repository for component go-component-kqoggz in namespace group-hphn do not have right state ('' != 'ready') yet but it has status {  { } {\u003cnil\u003e      } []}.\n",
        "SpecEvents": [
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
              "LineNumber": 60
            },
            "TimelineLocation": {
              "Order": 1,
              "Time": "2026-04-20T17:29:40.860847968Z"
            },
            "Message": "with status reporting of Integration tests in CheckRuns",
            "NodeType": "BeforeAll"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
              "LineNumber": 60
            },
            "TimelineLocation": {
              "Offset": 63,
              "Order": 3,
              "Time": "2026-04-20T17:29:45.220011932Z"
            },
            "Message": "with status reporting of Integration tests in CheckRuns",
            "Duration": 4359163964,
            "NodeType": "BeforeAll"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
              "LineNumber": 205
            },
            "TimelineLocation": {
              "Offset": 63,
              "Order": 4,
              "Time": "2026-04-20T17:29:45.220258239Z"
            },
            "Message": "creates the Component A successfully",
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
              "LineNumber": 205
            },
            "TimelineLocation": {
              "Offset": 552,
              "Order": 6,
              "Time": "2026-04-20T17:30:15.675824266Z"
            },
            "Message": "creates the Component A successfully",
            "Duration": 30455566027,
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
              "LineNumber": 50
            },
            "TimelineLocation": {
              "Offset": 552,
              "Order": 7,
              "Time": "2026-04-20T17:30:15.676088793Z"
            },
            "Message": "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
            "NodeType": "AfterEach"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
              "LineNumber": 50
            },
            "TimelineLocation": {
              "Offset": 552,
              "Order": 9,
              "Time": "2026-04-20T17:30:15.676171186Z"
            },
            "Message": "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
            "Duration": 82382,
            "NodeType": "AfterEach"
          }
        ]
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when we start creation of a new Component A"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 204
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 213
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers a Build PipelineRun for componentA go-component",
        "State": "failed",
        "StartTime": "2026-04-20T17:30:15.676709931Z",
        "EndTime": "2026-04-20T17:45:17.225207672Z",
        "RunTime": 901548497741,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Timed out after 900.000s.\ntimed out when waiting for the build PipelineRun to start for the componentA group-hphn/go-component-kqoggz\nExpected success, but got an error:\n    \u003c*errors.errorString | 0xc00090b150\u003e: \n    no pipelinerun found for component go-component-kqoggz\n    {\n        s: \"no pipelinerun found for component go-component-kqoggz\",\n    }",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 224,
            "FullStackTrace": "github.com/konflux-ci/e2e-tests/tests/integration-service.init.func3.1.3.2()\n\t/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go:224 +0x26b"
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 11,
            "Time": "2026-04-20T17:45:15.677780941Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 213
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 1,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0,
        "CapturedGinkgoWriterOutput": "Build PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\nBuild PipelineRun has not been created yet for the componentA group-hphn/go-component-kqoggz\n",
        "SpecEvents": [
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
              "LineNumber": 213
            },
            "TimelineLocation": {
              "Order": 10,
              "Time": "2026-04-20T17:30:15.676850965Z"
            },
            "Message": "triggers a Build PipelineRun for componentA go-component",
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
              "LineNumber": 213
            },
            "TimelineLocation": {
              "Offset": 4185,
              "Order": 12,
              "Time": "2026-04-20T17:45:15.677807981Z"
            },
            "Message": "triggers a Build PipelineRun for componentA go-component",
            "Duration": 900000957036,
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
              "LineNumber": 149
            },
            "TimelineLocation": {
              "Offset": 4185,
              "Order": 13,
              "Time": "2026-04-20T17:45:15.678134579Z"
            },
            "Message": "with status reporting of Integration tests in CheckRuns",
            "NodeType": "AfterAll"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
              "LineNumber": 149
            },
            "TimelineLocation": {
              "Offset": 4185,
              "Order": 15,
              "Time": "2026-04-20T17:45:17.103623119Z"
            },
            "Message": "with status reporting of Integration tests in CheckRuns",
            "Duration": 1425488519,
            "NodeType": "AfterAll"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
              "LineNumber": 50
            },
            "TimelineLocation": {
              "Offset": 4185,
              "Order": 16,
              "Time": "2026-04-20T17:45:17.103848885Z"
            },
            "Message": "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
            "NodeType": "AfterEach"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
              "LineNumber": 50
            },
            "TimelineLocation": {
              "Offset": 4185,
              "Order": 18,
              "Time": "2026-04-20T17:45:17.225198872Z"
            },
            "Message": "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
            "Duration": 121349987,
            "NodeType": "AfterEach"
          }
        ]
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when we start creation of a new Component A"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 204
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 227
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "does not contain an annotation with a Snapshot Name",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.225836558Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 227
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 19,
            "Time": "2026-04-20T17:45:17.225833948Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 227
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when we start creation of a new Component A"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 204
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 231
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to build PipelineRunA finishing successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.226150766Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 231
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 20,
            "Time": "2026-04-20T17:45:17.226149556Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 231
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when we start creation of a new Component A"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 204
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 236
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a PaC PR creation for componentA go-component",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.226401202Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 236
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 21,
            "Time": "2026-04-20T17:45:17.226399853Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 236
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when the Build PLRA is finished successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 257
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 258
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "checks if the Snapshot is created",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.226634748Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 258
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 22,
            "Time": "2026-04-20T17:45:17.226633479Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 258
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when the Build PLRA is finished successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 257
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 263
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should find the related Integration PipelineRuns",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.226837584Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 263
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 23,
            "Time": "2026-04-20T17:45:17.226836404Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 263
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when the Build PLRA is finished successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 257
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 270
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "integration pipeline should end up with success",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.22706209Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 270
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 24,
            "Time": "2026-04-20T17:45:17.22706073Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 270
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when the Snapshot testing is completed successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 276
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 277
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should merge the init PaC PR successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.227272135Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 277
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 25,
            "Time": "2026-04-20T17:45:17.227270975Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 277
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when we start creation of a new Component B"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 295
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 296
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates the Component B successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.22747874Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 296
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 26,
            "Time": "2026-04-20T17:45:17.22747764Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 296
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when we start creation of a new Component B"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 295
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 304
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers a Build PipelineRun for component python-component",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.227669675Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 304
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 27,
            "Time": "2026-04-20T17:45:17.227668645Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 304
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when we start creation of a new Component B"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 295
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 318
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "does not contain an annotation with a Snapshot Name",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.227886651Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 318
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 28,
            "Time": "2026-04-20T17:45:17.227885291Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 318
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when we start creation of a new Component B"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 295
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 322
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to build PipelineRun finishing successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.228120437Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 322
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 29,
            "Time": "2026-04-20T17:45:17.228118777Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 322
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when we start creation of a new Component B"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 295
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 327
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a PaC PR creation for component python-component",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.228319772Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 327
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 30,
            "Time": "2026-04-20T17:45:17.228318622Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 327
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when the Build PLR is finished successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 348
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 349
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "checks if the Snapshot is created",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.228536387Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 349
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 31,
            "Time": "2026-04-20T17:45:17.228535327Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 349
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when the Build PLR is finished successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 348
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 354
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should find the related Integration PipelineRuns",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.228730762Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 354
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 32,
            "Time": "2026-04-20T17:45:17.228729722Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 354
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when the Build PLR is finished successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 348
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 361
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "integration pipeline should end up with success",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.228942518Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 361
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 33,
            "Time": "2026-04-20T17:45:17.228926487Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 361
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when the Snapshot testing is completed successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 367
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 368
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should merge the init PaC PR successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.229225055Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 368
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 34,
            "Time": "2026-04-20T17:45:17.229222365Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 368
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when we start creation of a new Component C"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 386
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 387
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "creates the Component C successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.22942787Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 387
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 35,
            "Time": "2026-04-20T17:45:17.22942649Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 387
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when we start creation of a new Component C"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 386
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 395
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers a Build PipelineRun for componentC konflux-test-integration-clone",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.229628215Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 395
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 36,
            "Time": "2026-04-20T17:45:17.229626855Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 395
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when we start creation of a new Component C"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 386
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 409
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "does not contain an annotation with a Snapshot Name",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.22982999Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 409
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 37,
            "Time": "2026-04-20T17:45:17.229828521Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 409
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when we start creation of a new Component C"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 386
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 413
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to build PipelineRun finishing successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.230104348Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 413
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 38,
            "Time": "2026-04-20T17:45:17.230103128Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 413
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when we start creation of a new Component C"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 386
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 418
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to a PaC PR creation for componentC konflux-test-integration-clone",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.230319363Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 418
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 39,
            "Time": "2026-04-20T17:45:17.230317883Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 418
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when the Build PLR is finished successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 439
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 440
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "checks if the Snapshot is created",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.230536839Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 440
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 40,
            "Time": "2026-04-20T17:45:17.230535459Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 440
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when the Build PLR is finished successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 439
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 445
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should find the related Integration PipelineRuns",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.230757874Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 445
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 41,
            "Time": "2026-04-20T17:45:17.230756844Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 445
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when the Build PLR is finished successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 439
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 452
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "integration pipeline should end up with success",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.23098276Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 452
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 42,
            "Time": "2026-04-20T17:45:17.23098173Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 452
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when the Snapshot testing is completed successfully"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 458
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 459
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should merge the init PaC PR successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.231212266Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 459
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 43,
            "Time": "2026-04-20T17:45:17.231211236Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 459
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when both the init PaC PRs are merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 478
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 479
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should make change to the root folder",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.231432151Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 479
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 44,
            "Time": "2026-04-20T17:45:17.231430371Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 479
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when both the init PaC PRs are merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 478
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 497
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should make change to the multiple-repo",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.231662107Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 497
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 45,
            "Time": "2026-04-20T17:45:17.231660857Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 497
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when both the init PaC PRs are merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 478
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 513
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "wait for the last components build to finish",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.231887353Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 513
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 46,
            "Time": "2026-04-20T17:45:17.231886233Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 513
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when both the init PaC PRs are merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 478
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 521
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "wait for all component snapshots to be created with proper PR group annotations",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.23215507Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 521
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 47,
            "Time": "2026-04-20T17:45:17.23215373Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 521
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when both the init PaC PRs are merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 478
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 556
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "get all group snapshots and check if pr-group annotation contains all components",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.232357615Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 556
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 48,
            "Time": "2026-04-20T17:45:17.232356495Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 556
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when both the init PaC PRs are merged"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 478
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 635
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "make sure that group snapshot contains last build pipelinerun for each component",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.23255048Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 635
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 49,
            "Time": "2026-04-20T17:45:17.23254933Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 635
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 647
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 648
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "make change to the multiple-repo to trigger a new cycle of testing",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.232750525Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 648
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 50,
            "Time": "2026-04-20T17:45:17.232749085Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 648
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 647
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 654
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "wait for the components A and B build to finish",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.23295245Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 654
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 51,
            "Time": "2026-04-20T17:45:17.23295132Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 654
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 647
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 663
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "get all component snapshots for component A and check if older snapshot has been cancelled",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.233197717Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 663
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 52,
            "Time": "2026-04-20T17:45:17.233196567Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 663
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 647
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 690
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "get all group snapshots and check if older group snapshot is cancelled",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.233439603Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 690
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 53,
            "Time": "2026-04-20T17:45:17.233438503Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 690
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when ResolutionRequest is deleted after pipeline completes"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 719
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 720
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that ResolutionRequest is deleted after pipeline resolution",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.233645428Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 720
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 54,
            "Time": "2026-04-20T17:45:17.233644218Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 720
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when ResolutionRequest is deleted after pipeline completes"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 719
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 740
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that no orphaned ResolutionRequests remain in namespace after test completion",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.233844323Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 740
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 55,
            "Time": "2026-04-20T17:45:17.233843273Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 740
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Creation of group snapshots for monorepo and multiple repos]",
          "with status reporting of Integration tests in CheckRuns",
          "when IntegrationTestScenario reference to task as pipelinerun resolution"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 52
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 774
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "group-snapshot-creation"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
          "LineNumber": 780
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "trigger pipelinerun for invalid integrationTestScenario by annotating snapshot and verify failing to create integration pipelinerun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:45:17.234072889Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 14,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 780
          },
          "TimelineLocation": {
            "Offset": 4185,
            "Order": 56,
            "Time": "2026-04-20T17:45:17.234071769Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/group-snapshots-tests.go",
            "LineNumber": 780
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline]",
          "Multi arch test happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/multiarch_advisories.go",
            "LineNumber": 59
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/multiarch_advisories.go",
            "LineNumber": 110
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rh-advisories",
            "multiarch-advisories"
          ],
          [
            "multiArchAdvisories"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/multiarch_advisories.go",
          "LineNumber": 112
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies the release CR is created",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.056076186Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline]",
          "Multi arch test happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/multiarch_advisories.go",
            "LineNumber": 59
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/multiarch_advisories.go",
            "LineNumber": 110
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rh-advisories",
            "multiarch-advisories"
          ],
          [
            "multiArchAdvisories"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/multiarch_advisories.go",
          "LineNumber": 122
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies the multiarch release pipelinerun is running and succeeds",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.056365354Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline]",
          "Multi arch test happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/multiarch_advisories.go",
            "LineNumber": 59
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/multiarch_advisories.go",
            "LineNumber": 110
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rh-advisories",
            "multiarch-advisories"
          ],
          [
            "multiArchAdvisories"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/multiarch_advisories.go",
          "LineNumber": 152
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies release CR completed and set succeeded.",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.057159335Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline]",
          "Multi arch test happy path",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 41
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/multiarch_advisories.go",
            "LineNumber": 59
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/multiarch_advisories.go",
            "LineNumber": 110
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-pipelines",
            "rh-advisories",
            "multiarch-advisories"
          ],
          [
            "multiArchAdvisories"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/pipelines/multiarch_advisories.go",
          "LineNumber": 163
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies if the repository URL is valid",
        "State": "pending",
        "StartTime": "2026-04-20T17:29:41.05887933Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.]",
          "post-release verification."
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/block_releases_release_plan_admission.go",
            "LineNumber": 68
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "release-neg",
            "negBlockReleases"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/block_releases_release_plan_admission.go",
          "LineNumber": 69
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "block-releases true in ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user.",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.0600053Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite Release service tenant pipeline]",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/tenant_pipelines.go",
            "LineNumber": 108
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "tenant"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/tenant_pipelines.go",
          "LineNumber": 110
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that a Release CR should have been created in the dev namespace",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.061072189Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite Release service tenant pipeline]",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/tenant_pipelines.go",
            "LineNumber": 108
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "tenant"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/tenant_pipelines.go",
          "LineNumber": 117
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that Tenant PipelineRun is triggered",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.06147993Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[release-service-suite Release service tenant pipeline]",
          "Post-release verification"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 45
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/tenant_pipelines.go",
            "LineNumber": 108
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "release-service",
            "tenant"
          ],
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/release/service/tenant_pipelines.go",
          "LineNumber": 121
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "verifies that a Release is marked as succeeded.",
        "State": "skipped",
        "StartTime": "2026-04-20T17:29:41.061781438Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Forgejo Status Reporting of Integration tests]",
          "Forgejo with status reporting of Integration tests in the associated merge request",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 43
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 127
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "forgejo-status-reporting"
          ],
          null,
          [
            "custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
          "LineNumber": 196
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "triggers a Build PipelineRun",
        "State": "passed",
        "StartTime": "2026-04-20T17:29:41.062551518Z",
        "EndTime": "2026-04-20T17:31:11.736007681Z",
        "RunTime": 90673456172,
        "ParallelProcess": 15,
        "NumAttempts": 1,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0,
        "CapturedGinkgoWriterOutput": "Image repository for component test-comp-pac-forgejo-pbtckf in namespace forgejo-rep-xjws do not have right state ('' != 'ready') yet but it has status {  { } {\u003cnil\u003e      } []}.\nBuild PipelineRun has not been created yet for the component forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf\n",
        "SpecEvents": [
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 44
            },
            "TimelineLocation": {
              "Order": 1,
              "Time": "2026-04-20T17:29:41.062808715Z"
            },
            "Message": "Forgejo with status reporting of Integration tests in the associated merge request",
            "NodeType": "BeforeAll"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 44
            },
            "TimelineLocation": {
              "Order": 3,
              "Time": "2026-04-20T17:29:58.361266681Z"
            },
            "Message": "Forgejo with status reporting of Integration tests in the associated merge request",
            "Duration": 17298457966,
            "NodeType": "BeforeAll"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 128
            },
            "TimelineLocation": {
              "Order": 4,
              "Time": "2026-04-20T17:29:58.361533628Z"
            },
            "Message": "when a new Component with specified custom branch is created",
            "NodeType": "BeforeAll"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 128
            },
            "TimelineLocation": {
              "Offset": 178,
              "Order": 6,
              "Time": "2026-04-20T17:30:51.692263634Z"
            },
            "Message": "when a new Component with specified custom branch is created",
            "Duration": 53330729996,
            "NodeType": "BeforeAll"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 196
            },
            "TimelineLocation": {
              "Offset": 178,
              "Order": 7,
              "Time": "2026-04-20T17:30:51.692446799Z"
            },
            "Message": "triggers a Build PipelineRun",
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 196
            },
            "TimelineLocation": {
              "Offset": 285,
              "Order": 9,
              "Time": "2026-04-20T17:31:11.735648731Z"
            },
            "Message": "triggers a Build PipelineRun",
            "Duration": 20043201932,
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 41
            },
            "TimelineLocation": {
              "Offset": 285,
              "Order": 10,
              "Time": "2026-04-20T17:31:11.735916188Z"
            },
            "Message": "[integration-service-suite Forgejo Status Reporting of Integration tests]",
            "NodeType": "AfterEach"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 41
            },
            "TimelineLocation": {
              "Offset": 285,
              "Order": 12,
              "Time": "2026-04-20T17:31:11.73598963Z"
            },
            "Message": "[integration-service-suite Forgejo Status Reporting of Integration tests]",
            "Duration": 73452,
            "NodeType": "AfterEach"
          }
        ]
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Forgejo Status Reporting of Integration tests]",
          "Forgejo with status reporting of Integration tests in the associated merge request",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 43
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 127
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "forgejo-status-reporting"
          ],
          null,
          [
            "custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
          "LineNumber": 210
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "does not contain an annotation with a Snapshot Name",
        "State": "passed",
        "StartTime": "2026-04-20T17:31:11.736464572Z",
        "EndTime": "2026-04-20T17:31:11.736792051Z",
        "RunTime": 327479,
        "ParallelProcess": 15,
        "NumAttempts": 1,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0,
        "SpecEvents": [
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 210
            },
            "TimelineLocation": {
              "Order": 13,
              "Time": "2026-04-20T17:31:11.736587355Z"
            },
            "Message": "does not contain an annotation with a Snapshot Name",
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 210
            },
            "TimelineLocation": {
              "Order": 15,
              "Time": "2026-04-20T17:31:11.736643307Z"
            },
            "Message": "does not contain an annotation with a Snapshot Name",
            "Duration": 55952,
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 41
            },
            "TimelineLocation": {
              "Order": 16,
              "Time": "2026-04-20T17:31:11.73675835Z"
            },
            "Message": "[integration-service-suite Forgejo Status Reporting of Integration tests]",
            "NodeType": "AfterEach"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 41
            },
            "TimelineLocation": {
              "Order": 18,
              "Time": "2026-04-20T17:31:11.73678751Z"
            },
            "Message": "[integration-service-suite Forgejo Status Reporting of Integration tests]",
            "Duration": 29161,
            "NodeType": "AfterEach"
          }
        ]
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Forgejo Status Reporting of Integration tests]",
          "Forgejo with status reporting of Integration tests in the associated merge request",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 43
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 127
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "forgejo-status-reporting"
          ],
          null,
          [
            "custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
          "LineNumber": 214
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should lead to build PipelineRun finishing successfully",
        "State": "failed",
        "StartTime": "2026-04-20T17:31:11.73715312Z",
        "EndTime": "2026-04-20T17:49:58.889475139Z",
        "RunTime": 1127152322009,
        "ParallelProcess": 15,
        "Failure": {
          "Message": "Expected success, but got an error:\n    \u003c*errors.errorString | 0xc0015d2a20\u003e: \n    \n     pod: test-comp-pac-forgejo-pbtckf-on-pull-request-djm7b-init-pod | init container: prepare\n    2026/04/20 17:31:03 Entrypoint initialization\n    \n    pod: test-comp-pac-forgejo-pbtckf-on-pull-request-djm7b-init-pod | container step-init: \n    time=\"2026-04-20T17:31:07Z\" level=info msg=\"Using in-cluster config\" logger=KubeClient\n    time=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] enable: false\"\n    time=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] default-http-proxy: squid.caching.svc.cluster.local:3128\"\n    time=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\"\n    time=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] http-proxy-result-path: /tekton/results/http-proxy\"\n    time=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] no-proxy-result-path: /tekton/results/no-proxy\"\n    time=\"2026-04-20T17:31:07Z\" level=info msg=\"Cache proxy is disabled in param or in backend\"\n    time=\"2026-04-20T17:31:07Z\" level=info msg=\"[result] HTTP PROXY: \"\n    time=\"2026-04-20T17:31:07Z\" level=info msg=\"[result] NO PROXY: \"\n    \n     pod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-init-pod | init container: prepare\n    2026/04/20 17:42:00 Entrypoint initialization\n    \n    pod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-init-pod | container step-init: \n    time=\"2026-04-20T17:42:03Z\" level=info msg=\"Using in-cluster config\" logger=KubeClient\n    time=\"2026-04-20T17:42:03Z\" level=info msg=\"[param] enable: false\"\n    time=\"2026-04-20T17:42:03Z\" level=info msg=\"[param] default-http-proxy: squid.caching.svc.cluster.local:3128\"\n    time=\"2026-04-20T17:42:03Z\" level=info msg=\"[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\"\n    time=\"2026-04-20T17:42:03Z\" level=info msg=\"[param] http-proxy-result-path: /tekton/results/http-proxy\"\n    time=\"2026-04-20T17:42:03Z\" level=info msg=\"[param] no-proxy-result-path: /tekton/results/no-proxy\"\n    time=\"2026-04-20T17:42:03Z\" level=info msg=\"Cache proxy is disabled in param or in backend\"\n    time=\"2026-04-20T17:42:03Z\" level=info msg=\"[result] HTTP PROXY: \"\n    time=\"2026-04-20T17:42:03Z\" level=info msg=\"[result] NO PROXY: \"\n    \n     pod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-tpa-scan-pod | init container: prepare\n    2026/04/20 17:46:26 Entrypoint initialization\n    \n     pod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-tpa-scan-pod | init container: place-scripts\n    2026/04/20 17:46:27 Decoded script /tekton/scripts/script-0-pkk24\n    2026/04/20 17:46:27 Decoded script /tekton/scripts/script-1-666sl\n    2026/04/20 17:46:27 Decoded script /tekton/scripts/script-2-nbnf2\n    \n    pod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-tpa-scan-pod | container step-get-vulnerabilities: \n    Inspecting raw image manifest quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf@sha256:ea8744c45dad74236e8bdd06f4f40711dd4ec5771ad5abcd3cd05e6fa0332408.\n    Selecting auth\n    Using token for quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf\n    Selecting auth\n    Using token for quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf\n    WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.\n    WARNING: Downloading SBOMs this way does not ensure its authenticity. If you want to ensure a tamper-proof SBOM, download it using 'cosign download attestation \u003cimage uri\u003e'.\n    Found SBOM of media type: text/spdx+json\n    Running TPA scan on amd64 image manifest...\n      % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current\n                                     Dload  Upload   Total   Spent    Left  Speed\n    \r  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0\r100  360k    0     0  100  360k      0  1611k --:--:-- --:--:-- --:--:-- 1604k{\n      \"scanned\" : {\n        \"total\" : 152,\n        \"direct\" : 25,\n        \"transitive\" : 127\n      },\n      \"providers\" : {\n        \"rhtpa\" : {\n          \"status\" : {\n            \"ok\" : true,\n            \"name\" : \"rhtpa\",\n            \"code\" : 200,\n            \"message\" : \"OK\",\n            \"warnings\" : {\n              \"pkg:maven/io.github.stuartwdouglas.hacbstest.Main/hacbs-test\" : [ \"Unable to process: missing version component\" ]\n            }\n          },\n          \"sources\" : {\n            \"osv-github\" : {\n              \"summary\" : {\n                \"direct\" : 2,\n                \"transitive\" : 0,\n                \"total\" : 2,\n                \"dependencies\" : 1,\n                \"critical\" : 0,\n                \"high\" : 2,\n                \"medium\" : 0,\n                \"low\" : 0,\n                \"remediations\" : 0,\n                \"recommendations\" : 0,\n                \"unscanned\" : 0\n              },\n              \"dependencies\" : [ {\n                \"ref\" : \"pkg:pypi/setuptools@39.2.0\",\n                \"issues\" : [ {\n                  \"id\" : \"CVE-2024-6345\",\n                  \"source\" : \"osv-github\",\n                  \"cvssScore\" : 8.8,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2024-6345\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2022-40897\",\n                  \"source\" : \"osv-github\",\n                  \"cvssScore\" : 7.5,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2022-40897\" ],\n                  \"unique\" : false\n                } ],\n                \"transitive\" : [ ],\n                \"highestVulnerability\" : {\n                  \"id\" : \"CVE-2024-6345\",\n                  \"source\" : \"osv-github\",\n                  \"cvssScore\" : 8.8,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2024-6345\" ],\n                  \"unique\" : false\n                }\n              } ]\n            },\n            \"redhat-csaf\" : {\n              \"summary\" : {\n                \"direct\" : 50,\n                \"transitive\" : 338,\n                \"total\" : 388,\n                \"dependencies\" : 57,\n                \"critical\" : 7,\n                \"high\" : 134,\n                \"medium\" : 228,\n                \"low\" : 19,\n                \"remediations\" : 0,\n                \"recommendations\" : 0,\n                \"unscanned\" : 0\n              },\n              \"dependencies\" : [ {\n                \"ref\" : \"pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm\",\n                \"issues\" : [ {\n                  \"id\" : \"CVE-2023-40217\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 8.6,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2023-40217\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2022-42919\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.8,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2022-42919\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2023-6597\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.8,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2023-6597\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2015-20107\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.6,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2015-20107\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2024-12718\",\n                  \"title\" : \"Bypass extraction filter to modify file metadata outside extraction directory\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.6,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2024-12718\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2025-4517\",\n                  \"title\" : \"Arbitrary writes via tarfile realpath overflow\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.6,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2025-4517\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2020-10735\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.5,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2020-10735\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2022-45061\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.5,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2022-45061\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2023-24329\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.5,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2023-24329\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2024-6232\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.5,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2024-6232\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2025-12084\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.5,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2025-12084\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2025-4138\",\n                  \"title\" : \"Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.5,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2025-4138\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2025-4435\",\n                  \"title\" : \"Tarfile extracts filtered members when errorlevel=0\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.5,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2025-4435\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2025-8194\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.5,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2025-8194\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2021-28861\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.4,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2021-28861\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2025-4330\",\n                  \"title\" : \"Extraction filter bypass for linking outside extraction directory\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.3,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2025-4330\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2025-15366\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.1,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2025-15366\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2025-15367\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.1,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2025-15367\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2026-1299\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.1,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2026-1299\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2026-4519\",\n                  \"title\" : \"webbrowser.open() allows leading dashes in URLs\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.1,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2026-4519\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2024-6923\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 6.8,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2024-6923\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2025-0938\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 6.8,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2025-0938\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2025-13836\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 6.8,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2025-13836\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2024-9287\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 6.3,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2024-9287\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2024-0450\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 6.2,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2024-0450\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2007-4559\",\n                  \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 5.5,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2007-4559\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2023-27043\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 5.3,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2023-27043\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2024-8088\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 5.3,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2024-8088\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2024-0397\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 5.0,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2024-0397\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2024-7592\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 4.8,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2024-7592\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2026-0865\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 4.5,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2026-0865\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2025-6069\",\n                  \"title\" : \"HTMLParser quadratic complexity when processing malformed inputs\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 4.3,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2025-6069\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2025-8291\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 4.3,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2025-8291\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2025-6075\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 4.0,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2025-6075\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2024-11168\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 3.7,\n                  \"severity\" : \"LOW\",\n                  \"cves\" : [ \"CVE-2024-11168\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2024-4032\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 3.7,\n                  \"severity\" : \"LOW\",\n                  \"cves\" : [ \"CVE-2024-4032\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2024-5642\",\n                  \"title\" : \"Buffer overread when using an empty list with SSLContext.set_npn_protocols()\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 2.7,\n                  \"severity\" : \"LOW\",\n                  \"cves\" : [ \"CVE-2024-5642\" ],\n                  \"unique\" : false\n                } ],\n                \"transitive\" : [ {\n                  \"ref\" : \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-15467\",\n                    \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2025-15467\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1473\",\n                    \"title\" : \"Resource leakage when decoding certificates and keys\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1473\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-3358\",\n                    \"title\" : \"Using a Custom Cipher with NID_undef may lead to NULL encryption\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-3358\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-3602\",\n                    \"title\" : \"X.509 Email Address 4-byte Buffer Overflow\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-3602\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-3786\",\n                    \"title\" : \"X.509 Email Address Variable Length Buffer Overflow\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-3786\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-4450\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-4450\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0215\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0215\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0216\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0216\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0217\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0217\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0401\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0401\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-5363\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-5363\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0286\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0286\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-12797\",\n                    \"title\" : \"RFC7250 handshakes with unauthenticated servers don't abort as expected\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-12797\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69419\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69419\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1292\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1292\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-2068\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-2068\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2650\",\n                    \"title\" : \"Possible DoS translating ASN.1 object identifiers\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-2650\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6129\",\n                    \"title\" : \"POLY1305 MAC implementation corrupts vector registers on PowerPC\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-6129\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69421\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-69421\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-11187\",\n                    \"title\" : \"Improper validation of PBMAC1 parameters in PKCS#12 MAC verification\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-11187\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2020-1971\",\n                    \"title\" : \"EDIPARTYNAME NULL pointer dereference\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-1971\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-4304\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-4304\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0464\",\n                    \"title\" : \"Excessive Resource Usage Verifying X.509 Policy Constraints\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-0464\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6237\",\n                    \"title\" : \"Excessive time spent checking invalid RSA public keys\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-6237\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-5535\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-5535\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-6119\",\n                    \"title\" : \"Possible denial of service in X.509 name checks\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-6119\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15468\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15468\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-66199\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-66199\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69420\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-69420\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-22796\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-22796\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-4741\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-4741\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-9230\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-9230\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-0727\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-0727\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15469\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15469\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-22795\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-22795\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1343\",\n                    \"title\" : \"OCSP_basic_verify may incorrectly verify the response signing certificate\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1343\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-2097\",\n                    \"title\" : \"AES OCB fails to encrypt some bytes\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-2097\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0465\",\n                    \"title\" : \"Invalid certificate policies in leaf certificates are silently ignored\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-0465\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0466\",\n                    \"title\" : \"Certificate policy check not enabled\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-0466\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2975\",\n                    \"title\" : \"AES-SIV implementation ignores empty associated data entries\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-2975\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-3446\",\n                    \"title\" : \"Excessive time spent checking DH keys and parameters\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-3446\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-3817\",\n                    \"title\" : \"Excessive time spent checking DH q parameter value\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-3817\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-5678\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-5678\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-4603\",\n                    \"title\" : \"Excessive time spent checking DSA keys and parameters\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-4603\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-1255\",\n                    \"title\" : \"Input buffer over-read in AES-XTS implementation on 64 bit ARM\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-1255\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-4203\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-4203\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-68160\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-68160\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69418\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-69418\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-2511\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2024-2511\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-15467\",\n                    \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2025-15467\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-3596\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.0,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2024-3596\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-42898\",\n                    \"title\" : \"PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \\\"a similar bug.\\\"\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-42898\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-39975\",\n                    \"title\" : \"kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-39975\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-26462\",\n                    \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-26462\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-37370\",\n                    \"title\" : \"In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-37370\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2020-17049\",\n                    \"title\" : \"Kerberos KDC Security Feature Bypass Vulnerability\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.2,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2020-17049\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-36054\",\n                    \"title\" : \"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-36054\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-37371\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-37371\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-24528\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-24528\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-26458\",\n                    \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-26458\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-26461\",\n                    \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-26461\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-3576\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-3576\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-3596\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.0,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2024-3596\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-6345\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-6345\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-47273\",\n                    \"title\" : \"setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-47273\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-40897\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-40897\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-6345\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-6345\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15281\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15281\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1271\",\n                    \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1271\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-31115\",\n                    \"title\" : \"XZ has a heap-use-after-free bug in threaded .xz decoder\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-31115\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1271\",\n                    \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1271\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-40217\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-40217\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-42919\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-42919\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6597\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-6597\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2015-20107\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2015-20107\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-12718\",\n                    \"title\" : \"Bypass extraction filter to modify file metadata outside extraction directory\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-12718\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4517\",\n                    \"title\" : \"Arbitrary writes via tarfile realpath overflow\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4517\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2020-10735\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2020-10735\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-45061\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-45061\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-24329\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-24329\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-6232\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-6232\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-12084\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-12084\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4138\",\n                    \"title\" : \"Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4138\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4435\",\n                    \"title\" : \"Tarfile extracts filtered members when errorlevel=0\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4435\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8194\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-8194\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-28861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-28861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4330\",\n                    \"title\" : \"Extraction filter bypass for linking outside extraction directory\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.3,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4330\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15366\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-15366\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15367\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-15367\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-1299\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-1299\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-4519\",\n                    \"title\" : \"webbrowser.open() allows leading dashes in URLs\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-4519\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-6923\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-6923\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0938\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0938\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-13836\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-13836\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-9287\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-9287\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-0450\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-0450\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2007-4559\",\n                    \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2007-4559\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27043\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27043\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-8088\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-8088\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-0397\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-0397\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-7592\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-7592\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0865\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0865\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-6069\",\n                    \"title\" : \"HTMLParser quadratic complexity when processing malformed inputs\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-6069\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8291\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8291\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-6075\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-6075\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-11168\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2024-11168\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-4032\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2024-4032\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-5642\",\n                    \"title\" : \"Buffer overread when using an empty list with SSLContext.set_npn_protocols()\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 2.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2024-5642\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-40217\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-40217\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2018-25032\",\n                    \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.2,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2018-25032\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-37434\",\n                    \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-37434\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2018-25032\",\n                    \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.2,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2018-25032\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-2603\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-2603\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2602\",\n                    \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.3,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-2602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-2603\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-2603\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-6965\",\n                    \"title\" : \"Integer Truncation on SQLite\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.7,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-6965\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-7104\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.3,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-7104\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-3277\",\n                    \"title\" : \"An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.3,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-3277\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-35737\",\n                    \"title\" : \"SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-35737\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-6965\",\n                    \"title\" : \"Integer Truncation on SQLite\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.7,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-6965\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-52425\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-52425\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-28757\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-28757\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-45490\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-45490\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-45491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-45491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-8176\",\n                    \"title\" : \"Libexpat: expat: improper restriction of xml entity expansion depth in libexpat\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-8176\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-45492\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-45492\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-50602\",\n                    \"title\" : \"An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-50602\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-59375\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-59375\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-52425\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-52425\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-46828\",\n                    \"title\" : \"In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-46828\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-46828\",\n                    \"title\" : \"In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-46828\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1587\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1587\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-43618\",\n                    \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-43618\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-43618\",\n                    \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-43618\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2020-11023\",\n                    \"title\" : \"Potential XSS vulnerability in jQuery\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-11023\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2020-11023\",\n                    \"title\" : \"Potential XSS vulnerability in jQuery\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-11023\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-46848\",\n                    \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-46848\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-12133\",\n                    \"title\" : \"Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-12133\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-46848\",\n                    \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-46848\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1304\",\n                    \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1304\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1304\",\n                    \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1304\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2007-4559\",\n                    \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2007-4559\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2007-4559\",\n                    \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2007-4559\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2019-12900\",\n                    \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.4,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2019-12900\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2019-12900\",\n                    \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.4,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2019-12900\" ],\n                    \"unique\" : false\n                  }\n                } ],\n                \"highestVulnerability\" : {\n                  \"id\" : \"CVE-2025-15467\",\n                  \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 9.8,\n                  \"severity\" : \"CRITICAL\",\n                  \"cves\" : [ \"CVE-2025-15467\" ],\n                  \"unique\" : false\n                }\n              }, {\n                \"ref\" : \"pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm\",\n                \"issues\" : [ {\n                  \"id\" : \"CVE-2023-2953\",\n                  \"title\" : \"A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.1,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2023-2953\" ],\n                  \"unique\" : false\n                } ],\n                \"transitive\" : [ {\n                  \"ref\" : \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-15467\",\n                    \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2025-15467\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1473\",\n                    \"title\" : \"Resource leakage when decoding certificates and keys\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1473\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-3358\",\n                    \"title\" : \"Using a Custom Cipher with NID_undef may lead to NULL encryption\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-3358\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-3602\",\n                    \"title\" : \"X.509 Email Address 4-byte Buffer Overflow\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-3602\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-3786\",\n                    \"title\" : \"X.509 Email Address Variable Length Buffer Overflow\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-3786\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-4450\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-4450\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0215\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0215\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0216\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0216\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0217\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0217\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0401\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0401\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-5363\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-5363\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0286\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0286\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-12797\",\n                    \"title\" : \"RFC7250 handshakes with unauthenticated servers don't abort as expected\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-12797\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69419\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69419\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1292\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1292\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-2068\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-2068\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2650\",\n                    \"title\" : \"Possible DoS translating ASN.1 object identifiers\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-2650\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6129\",\n                    \"title\" : \"POLY1305 MAC implementation corrupts vector registers on PowerPC\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-6129\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69421\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-69421\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-11187\",\n                    \"title\" : \"Improper validation of PBMAC1 parameters in PKCS#12 MAC verification\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-11187\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2020-1971\",\n                    \"title\" : \"EDIPARTYNAME NULL pointer dereference\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-1971\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-4304\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-4304\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0464\",\n                    \"title\" : \"Excessive Resource Usage Verifying X.509 Policy Constraints\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-0464\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6237\",\n                    \"title\" : \"Excessive time spent checking invalid RSA public keys\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-6237\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-5535\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-5535\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-6119\",\n                    \"title\" : \"Possible denial of service in X.509 name checks\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-6119\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15468\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15468\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-66199\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-66199\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69420\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-69420\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-22796\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-22796\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-4741\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-4741\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-9230\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-9230\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-0727\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-0727\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15469\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15469\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-22795\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-22795\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1343\",\n                    \"title\" : \"OCSP_basic_verify may incorrectly verify the response signing certificate\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1343\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-2097\",\n                    \"title\" : \"AES OCB fails to encrypt some bytes\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-2097\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0465\",\n                    \"title\" : \"Invalid certificate policies in leaf certificates are silently ignored\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-0465\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0466\",\n                    \"title\" : \"Certificate policy check not enabled\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-0466\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2975\",\n                    \"title\" : \"AES-SIV implementation ignores empty associated data entries\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-2975\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-3446\",\n                    \"title\" : \"Excessive time spent checking DH keys and parameters\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-3446\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-3817\",\n                    \"title\" : \"Excessive time spent checking DH q parameter value\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-3817\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-5678\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-5678\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-4603\",\n                    \"title\" : \"Excessive time spent checking DSA keys and parameters\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-4603\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-1255\",\n                    \"title\" : \"Input buffer over-read in AES-XTS implementation on 64 bit ARM\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-1255\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-4203\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-4203\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-68160\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-68160\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69418\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-69418\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-2511\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2024-2511\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-15467\",\n                    \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2025-15467\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-3596\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.0,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2024-3596\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-42898\",\n                    \"title\" : \"PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \\\"a similar bug.\\\"\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-42898\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-39975\",\n                    \"title\" : \"kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-39975\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-26462\",\n                    \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-26462\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-37370\",\n                    \"title\" : \"In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-37370\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2020-17049\",\n                    \"title\" : \"Kerberos KDC Security Feature Bypass Vulnerability\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.2,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2020-17049\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-36054\",\n                    \"title\" : \"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-36054\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-37371\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-37371\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-24528\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-24528\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-26458\",\n                    \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-26458\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-26461\",\n                    \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-26461\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-3576\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-3576\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-3596\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.0,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2024-3596\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15281\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15281\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2018-25032\",\n                    \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.2,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2018-25032\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-37434\",\n                    \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-37434\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2018-25032\",\n                    \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.2,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2018-25032\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-2603\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-2603\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2602\",\n                    \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.3,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-2602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-2603\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-2603\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1587\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1587\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-43618\",\n                    \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-43618\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-43618\",\n                    \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-43618\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2020-11023\",\n                    \"title\" : \"Potential XSS vulnerability in jQuery\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-11023\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2020-11023\",\n                    \"title\" : \"Potential XSS vulnerability in jQuery\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-11023\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-46848\",\n                    \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-46848\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-12133\",\n                    \"title\" : \"Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-12133\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-46848\",\n                    \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-46848\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1304\",\n                    \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1304\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1304\",\n                    \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1304\" ],\n                    \"unique\" : false\n                  }\n                } ],\n                \"highestVulnerability\" : {\n                  \"id\" : \"CVE-2025-15467\",\n                  \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 9.8,\n                  \"severity\" : \"CRITICAL\",\n                  \"cves\" : [ \"CVE-2025-15467\" ],\n                  \"unique\" : false\n                }\n              }, {\n                \"ref\" : \"pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm\",\n                \"issues\" : [ {\n                  \"id\" : \"CVE-2026-21945\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.5,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2026-21945\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2025-64720\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.1,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2025-64720\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2025-65018\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 7.1,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2025-65018\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2026-21933\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 6.1,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2026-21933\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2026-21925\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 4.8,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2026-21925\" ],\n                  \"unique\" : false\n                } ],\n                \"transitive\" : [ {\n                  \"ref\" : \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-15467\",\n                    \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2025-15467\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1473\",\n                    \"title\" : \"Resource leakage when decoding certificates and keys\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1473\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-3358\",\n                    \"title\" : \"Using a Custom Cipher with NID_undef may lead to NULL encryption\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-3358\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-3602\",\n                    \"title\" : \"X.509 Email Address 4-byte Buffer Overflow\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-3602\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-3786\",\n                    \"title\" : \"X.509 Email Address Variable Length Buffer Overflow\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-3786\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-4450\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-4450\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0215\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0215\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0216\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0216\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0217\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0217\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0401\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0401\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-5363\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-5363\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0286\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0286\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-12797\",\n                    \"title\" : \"RFC7250 handshakes with unauthenticated servers don't abort as expected\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-12797\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69419\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69419\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1292\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1292\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-2068\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-2068\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2650\",\n                    \"title\" : \"Possible DoS translating ASN.1 object identifiers\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-2650\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6129\",\n                    \"title\" : \"POLY1305 MAC implementation corrupts vector registers on PowerPC\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-6129\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69421\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-69421\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-11187\",\n                    \"title\" : \"Improper validation of PBMAC1 parameters in PKCS#12 MAC verification\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-11187\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2020-1971\",\n                    \"title\" : \"EDIPARTYNAME NULL pointer dereference\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-1971\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-4304\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-4304\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0464\",\n                    \"title\" : \"Excessive Resource Usage Verifying X.509 Policy Constraints\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-0464\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6237\",\n                    \"title\" : \"Excessive time spent checking invalid RSA public keys\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-6237\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-5535\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-5535\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-6119\",\n                    \"title\" : \"Possible denial of service in X.509 name checks\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-6119\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15468\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15468\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-66199\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-66199\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69420\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-69420\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-22796\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-22796\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-4741\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-4741\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-9230\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-9230\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-0727\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-0727\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15469\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15469\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-22795\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-22795\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1343\",\n                    \"title\" : \"OCSP_basic_verify may incorrectly verify the response signing certificate\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1343\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-2097\",\n                    \"title\" : \"AES OCB fails to encrypt some bytes\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-2097\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0465\",\n                    \"title\" : \"Invalid certificate policies in leaf certificates are silently ignored\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-0465\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0466\",\n                    \"title\" : \"Certificate policy check not enabled\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-0466\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2975\",\n                    \"title\" : \"AES-SIV implementation ignores empty associated data entries\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-2975\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-3446\",\n                    \"title\" : \"Excessive time spent checking DH keys and parameters\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-3446\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-3817\",\n                    \"title\" : \"Excessive time spent checking DH q parameter value\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-3817\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-5678\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-5678\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-4603\",\n                    \"title\" : \"Excessive time spent checking DSA keys and parameters\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-4603\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-1255\",\n                    \"title\" : \"Input buffer over-read in AES-XTS implementation on 64 bit ARM\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-1255\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-4203\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-4203\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-68160\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-68160\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69418\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-69418\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-2511\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2024-2511\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-15467\",\n                    \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2025-15467\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-3596\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.0,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2024-3596\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-42898\",\n                    \"title\" : \"PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \\\"a similar bug.\\\"\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-42898\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-39975\",\n                    \"title\" : \"kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-39975\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-26462\",\n                    \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-26462\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-37370\",\n                    \"title\" : \"In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-37370\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2020-17049\",\n                    \"title\" : \"Kerberos KDC Security Feature Bypass Vulnerability\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.2,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2020-17049\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-36054\",\n                    \"title\" : \"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-36054\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-37371\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-37371\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-24528\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-24528\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-26458\",\n                    \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-26458\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-26461\",\n                    \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-26461\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-3576\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-3576\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-3596\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.0,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2024-3596\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-6345\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-6345\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-47273\",\n                    \"title\" : \"setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-47273\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-40897\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-40897\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-6345\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-6345\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15281\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15281\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/javapackages-filesystem@5.3.0-1.module%2Bel8%2B2447%2B6f56d9a6?arch=noarch\u0026distro=rhel-8.10\u0026upstream=javapackages-tools-5.3.0-1.module%2Bel8%2B2447%2B6f56d9a6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-48734\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-48734\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2019-10086\",\n                    \"title\" : \"In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.3,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2019-10086\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-48734\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-48734\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1271\",\n                    \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1271\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-31115\",\n                    \"title\" : \"XZ has a heap-use-after-free bug in threaded .xz decoder\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-31115\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1271\",\n                    \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1271\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-40217\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-40217\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-42919\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-42919\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6597\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-6597\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2015-20107\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2015-20107\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-12718\",\n                    \"title\" : \"Bypass extraction filter to modify file metadata outside extraction directory\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-12718\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4517\",\n                    \"title\" : \"Arbitrary writes via tarfile realpath overflow\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4517\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2020-10735\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2020-10735\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-45061\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-45061\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-24329\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-24329\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-6232\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-6232\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-12084\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-12084\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4138\",\n                    \"title\" : \"Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4138\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4435\",\n                    \"title\" : \"Tarfile extracts filtered members when errorlevel=0\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4435\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8194\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-8194\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-28861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-28861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4330\",\n                    \"title\" : \"Extraction filter bypass for linking outside extraction directory\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.3,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4330\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15366\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-15366\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15367\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-15367\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-1299\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-1299\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-4519\",\n                    \"title\" : \"webbrowser.open() allows leading dashes in URLs\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-4519\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-6923\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-6923\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0938\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0938\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-13836\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-13836\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-9287\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-9287\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-0450\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-0450\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2007-4559\",\n                    \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2007-4559\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27043\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27043\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-8088\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-8088\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-0397\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-0397\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-7592\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-7592\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0865\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0865\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-6069\",\n                    \"title\" : \"HTMLParser quadratic complexity when processing malformed inputs\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-6069\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8291\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8291\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-6075\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-6075\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-11168\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2024-11168\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-4032\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2024-4032\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-5642\",\n                    \"title\" : \"Buffer overread when using an empty list with SSLContext.set_npn_protocols()\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 2.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2024-5642\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-40217\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-40217\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2018-25032\",\n                    \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.2,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2018-25032\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-37434\",\n                    \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-37434\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2018-25032\",\n                    \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.2,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2018-25032\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/cups-libs@2.2.6-67.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=cups-2.2.6-67.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-58060\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-58060\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-47175\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.7,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-47175\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-34241\",\n                    \"title\" : \"CUPS vulnerable to use-after-free in cupsdAcceptClient()\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-34241\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-26691\",\n                    \"title\" : \"A logic issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. An application may be able to gain elevated privileges.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-26691\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-32360\",\n                    \"title\" : \"An authentication issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. An unauthenticated user may be able to access recently printed documents.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-32360\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-58364\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-58364\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-32324\",\n                    \"title\" : \"OpenPrinting CUPS vulnerable to heap buffer overflow\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-32324\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-58436\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-58436\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-35235\",\n                    \"title\" : \"Cupsd Listen arbitrary chmod 0140777\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.4,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-35235\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-58060\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-58060\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-2603\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-2603\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2602\",\n                    \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.3,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-2602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-2603\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-2603\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-6965\",\n                    \"title\" : \"Integer Truncation on SQLite\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.7,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-6965\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-7104\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.3,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-7104\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-3277\",\n                    \"title\" : \"An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.3,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-3277\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-35737\",\n                    \"title\" : \"SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-35737\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-6965\",\n                    \"title\" : \"Integer Truncation on SQLite\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.7,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-6965\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-52425\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-52425\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-28757\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-28757\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-45490\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-45490\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-45491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-45491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-8176\",\n                    \"title\" : \"Libexpat: expat: improper restriction of xml entity expansion depth in libexpat\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-8176\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-45492\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-45492\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-50602\",\n                    \"title\" : \"An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-50602\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-59375\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-59375\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-52425\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-52425\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-2509\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-2509\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-0553\",\n                    \"title\" : \"Gnutls: incomplete fix for cve-2023-5981\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-0553\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-0567\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-0567\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0361\",\n                    \"title\" : \"A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0361\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-32988\",\n                    \"title\" : \"Gnutls: vulnerability in gnutls othername san export\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-32988\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-32990\",\n                    \"title\" : \"Gnutls: vulnerability in gnutls certtool template parsing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-32990\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-6395\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-6395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-5981\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-5981\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-12243\",\n                    \"title\" : \"Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-12243\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-28834\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-28834\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-14831\",\n                    \"title\" : \"Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14831\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-32989\",\n                    \"title\" : \"Gnutls: vulnerability in gnutls sct extension parsing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-32989\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-28835\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-28835\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-9820\",\n                    \"title\" : \"Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-9820\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-2509\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-2509\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-46828\",\n                    \"title\" : \"In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-46828\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-46828\",\n                    \"title\" : \"In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-46828\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1587\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1587\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/lua@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-44964\",\n                    \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-44964\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-33099\",\n                    \"title\" : \"An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-33099\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-28805\",\n                    \"title\" : \"singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-28805\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-43519\",\n                    \"title\" : \"Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-43519\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-44964\",\n                    \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-44964\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-44964\",\n                    \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-44964\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-33099\",\n                    \"title\" : \"An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-33099\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-28805\",\n                    \"title\" : \"singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-28805\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-43519\",\n                    \"title\" : \"Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-43519\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-44964\",\n                    \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-44964\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/dbus-libs@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-42010\",\n                    \"title\" : \"An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-42010\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-42011\",\n                    \"title\" : \"An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-42011\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-42012\",\n                    \"title\" : \"An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-42012\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-34969\",\n                    \"title\" : \"D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-34969\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-42010\",\n                    \"title\" : \"An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-42010\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-43618\",\n                    \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-43618\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-43618\",\n                    \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-43618\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/avahi-libs@0.7-27.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=avahi-0.7-27.el8_10.1.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-3468\",\n                    \"title\" : \"A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-3468\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-1981\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-1981\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-38469\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-38469\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-38470\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-38470\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-38471\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-38471\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-38472\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-38472\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-38473\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-38473\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-3502\",\n                    \"title\" : \"A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-3502\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-52615\",\n                    \"title\" : \"Avahi: avahi wide-area dns uses constant source port\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-52615\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-52616\",\n                    \"title\" : \"Avahi: avahi wide-area dns predictable transaction ids\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-52616\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-3468\",\n                    \"title\" : \"A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-3468\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-14104\",\n                    \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14104\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-14104\",\n                    \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14104\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2020-11023\",\n                    \"title\" : \"Potential XSS vulnerability in jQuery\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-11023\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2020-11023\",\n                    \"title\" : \"Potential XSS vulnerability in jQuery\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-11023\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-14104\",\n                    \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14104\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-27456\",\n                    \"title\" : \"util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-27456\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-14104\",\n                    \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14104\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2020-11023\",\n                    \"title\" : \"Potential XSS vulnerability in jQuery\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-11023\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2020-11023\",\n                    \"title\" : \"Potential XSS vulnerability in jQuery\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-11023\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-14104\",\n                    \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14104\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-14104\",\n                    \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14104\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=systemd-239-82.el8_10.15.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-7008\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-7008\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-3821\",\n                    \"title\" : \"An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3821\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-4415\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-4415\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-45873\",\n                    \"title\" : \"systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-45873\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4598\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-4598\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-7008\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-7008\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-46848\",\n                    \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-46848\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-12133\",\n                    \"title\" : \"Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-12133\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-46848\",\n                    \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-46848\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2236\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-2236\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2236\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-2236\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1304\",\n                    \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1304\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1304\",\n                    \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1304\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2007-4559\",\n                    \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2007-4559\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2007-4559\",\n                    \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2007-4559\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2019-12900\",\n                    \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.4,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2019-12900\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2019-12900\",\n                    \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.4,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2019-12900\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/alsa-lib@1.2.10-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=alsa-lib-1.2.10-2.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2026-25068\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-25068\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2026-25068\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-25068\" ],\n                    \"unique\" : false\n                  }\n                } ],\n                \"highestVulnerability\" : {\n                  \"id\" : \"CVE-2025-15467\",\n                  \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 9.8,\n                  \"severity\" : \"CRITICAL\",\n                  \"cves\" : [ \"CVE-2025-15467\" ],\n                  \"unique\" : false\n                }\n              }, {\n                \"ref\" : \"pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\",\n                \"issues\" : [ {\n                  \"id\" : \"CVE-2021-35938\",\n                  \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 6.5,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2021-35938\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2021-35939\",\n                  \"title\" : \"It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 6.5,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2021-35939\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2021-35937\",\n                  \"title\" : \"A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 6.3,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2021-35937\" ],\n                  \"unique\" : false\n                } ],\n                \"transitive\" : [ {\n                  \"ref\" : \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-15467\",\n                    \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2025-15467\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1473\",\n                    \"title\" : \"Resource leakage when decoding certificates and keys\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1473\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-3358\",\n                    \"title\" : \"Using a Custom Cipher with NID_undef may lead to NULL encryption\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-3358\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-3602\",\n                    \"title\" : \"X.509 Email Address 4-byte Buffer Overflow\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-3602\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-3786\",\n                    \"title\" : \"X.509 Email Address Variable Length Buffer Overflow\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-3786\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-4450\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-4450\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0215\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0215\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0216\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0216\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0217\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0217\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0401\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0401\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-5363\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-5363\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0286\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0286\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-12797\",\n                    \"title\" : \"RFC7250 handshakes with unauthenticated servers don't abort as expected\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-12797\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69419\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69419\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1292\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1292\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-2068\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-2068\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2650\",\n                    \"title\" : \"Possible DoS translating ASN.1 object identifiers\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-2650\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6129\",\n                    \"title\" : \"POLY1305 MAC implementation corrupts vector registers on PowerPC\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-6129\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69421\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-69421\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-11187\",\n                    \"title\" : \"Improper validation of PBMAC1 parameters in PKCS#12 MAC verification\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-11187\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2020-1971\",\n                    \"title\" : \"EDIPARTYNAME NULL pointer dereference\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-1971\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-4304\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-4304\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0464\",\n                    \"title\" : \"Excessive Resource Usage Verifying X.509 Policy Constraints\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-0464\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6237\",\n                    \"title\" : \"Excessive time spent checking invalid RSA public keys\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-6237\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-5535\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-5535\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-6119\",\n                    \"title\" : \"Possible denial of service in X.509 name checks\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-6119\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15468\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15468\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-66199\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-66199\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69420\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-69420\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-22796\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-22796\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-4741\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-4741\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-9230\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-9230\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-0727\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-0727\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15469\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15469\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-22795\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-22795\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1343\",\n                    \"title\" : \"OCSP_basic_verify may incorrectly verify the response signing certificate\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1343\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-2097\",\n                    \"title\" : \"AES OCB fails to encrypt some bytes\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-2097\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0465\",\n                    \"title\" : \"Invalid certificate policies in leaf certificates are silently ignored\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-0465\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0466\",\n                    \"title\" : \"Certificate policy check not enabled\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-0466\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2975\",\n                    \"title\" : \"AES-SIV implementation ignores empty associated data entries\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-2975\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-3446\",\n                    \"title\" : \"Excessive time spent checking DH keys and parameters\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-3446\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-3817\",\n                    \"title\" : \"Excessive time spent checking DH q parameter value\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-3817\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-5678\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-5678\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-4603\",\n                    \"title\" : \"Excessive time spent checking DSA keys and parameters\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-4603\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-1255\",\n                    \"title\" : \"Input buffer over-read in AES-XTS implementation on 64 bit ARM\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-1255\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-4203\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-4203\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-68160\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-68160\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69418\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-69418\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-2511\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2024-2511\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-15467\",\n                    \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2025-15467\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-32207\",\n                    \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2022-32207\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-22576\",\n                    \"title\" : \"An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-22576\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-38545\",\n                    \"title\" : \"This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\\nhandshake.\\n\\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\\nthat to resolve the address instead of it getting done by curl itself, the\\nmaximum length that host name can be is 255 bytes.\\n\\nIf the host name is detected to be longer, curl switches to local name\\nresolving and instead passes on the resolved address only. Due to this bug,\\nthe local variable that means \\\"let the host resolve the name\\\" could get the\\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\\ncopy the too long host name to the target buffer instead of copying just the\\nresolved address there.\\n\\nThe target buffer being a heap based buffer, and the host name coming from the\\nURL that curl has been told to operate with.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-38545\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-27775\",\n                    \"title\" : \"An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-27775\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-27782\",\n                    \"title\" : \"libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-27782\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-2398\",\n                    \"title\" : \"HTTP/2 push headers memory-leak\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2398\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-32206\",\n                    \"title\" : \"curl \u003c 7.84.0 supports \\\"chained\\\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \\\"malloc bomb\\\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-32206\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-23916\",\n                    \"title\" : \"An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \\\"chained\\\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \\\"malloc bomb\\\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-23916\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-43552\",\n                    \"title\" : \"A use after free vulnerability exists in curl \u003c7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-43552\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27535\",\n                    \"title\" : \"An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27535\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27536\",\n                    \"title\" : \"An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27536\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-28321\",\n                    \"title\" : \"An improper certificate validation vulnerability exists in curl \u003cv8.1.0 in the way it supports matching of wildcard patterns when listed as \\\"Subject Alternative Name\\\" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-28321\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27538\",\n                    \"title\" : \"An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27538\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-32208\",\n                    \"title\" : \"When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-32208\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-46218\",\n                    \"title\" : \"This flaw allows a malicious HTTP server to set \\\"super cookies\\\" in curl that\\nare then passed back to more origins than what is otherwise allowed or\\npossible. This allows a site to set cookies that then would get sent to\\ndifferent and unrelated sites and domains.\\n\\nIt could do this by exploiting a mixed case flaw in curl's function that\\nverifies a given cookie domain against the Public Suffix List (PSL). For\\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-46218\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-9086\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-9086\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-27774\",\n                    \"title\" : \"An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-27774\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-32221\",\n                    \"title\" : \"When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-32221\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-27776\",\n                    \"title\" : \"A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-27776\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27533\",\n                    \"title\" : \"A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \\\"telnet options\\\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27533\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27534\",\n                    \"title\" : \"A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-27534\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-28322\",\n                    \"title\" : \"An information disclosure vulnerability exists in curl \u003cv8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-28322\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-38546\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-38546\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-35252\",\n                    \"title\" : \"When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\\\"sister site\\\" to deny service to all siblings.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.1,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2022-35252\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-32207\",\n                    \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2022-32207\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-32207\",\n                    \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2022-32207\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-22576\",\n                    \"title\" : \"An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-22576\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-38545\",\n                    \"title\" : \"This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\\nhandshake.\\n\\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\\nthat to resolve the address instead of it getting done by curl itself, the\\nmaximum length that host name can be is 255 bytes.\\n\\nIf the host name is detected to be longer, curl switches to local name\\nresolving and instead passes on the resolved address only. Due to this bug,\\nthe local variable that means \\\"let the host resolve the name\\\" could get the\\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\\ncopy the too long host name to the target buffer instead of copying just the\\nresolved address there.\\n\\nThe target buffer being a heap based buffer, and the host name coming from the\\nURL that curl has been told to operate with.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-38545\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15079\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-15079\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-27775\",\n                    \"title\" : \"An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-27775\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-27782\",\n                    \"title\" : \"libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-27782\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-2398\",\n                    \"title\" : \"HTTP/2 push headers memory-leak\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2398\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-13034\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-13034\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-14819\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14819\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-1965\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-1965\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-32206\",\n                    \"title\" : \"curl \u003c 7.84.0 supports \\\"chained\\\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \\\"malloc bomb\\\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-32206\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-23916\",\n                    \"title\" : \"An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \\\"chained\\\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \\\"malloc bomb\\\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-23916\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-14524\",\n                    \"title\" : \"bearer token leak on cross-protocol redirect\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14524\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-3784\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-3784\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-3805\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-3805\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-43552\",\n                    \"title\" : \"A use after free vulnerability exists in curl \u003c7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-43552\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27535\",\n                    \"title\" : \"An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27535\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27536\",\n                    \"title\" : \"An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27536\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-28321\",\n                    \"title\" : \"An improper certificate validation vulnerability exists in curl \u003cv8.1.0 in the way it supports matching of wildcard patterns when listed as \\\"Subject Alternative Name\\\" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-28321\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-10966\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-10966\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-3783\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-3783\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27538\",\n                    \"title\" : \"An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27538\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-32208\",\n                    \"title\" : \"When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-32208\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-46218\",\n                    \"title\" : \"This flaw allows a malicious HTTP server to set \\\"super cookies\\\" in curl that\\nare then passed back to more origins than what is otherwise allowed or\\npossible. This allows a site to set cookies that then would get sent to\\ndifferent and unrelated sites and domains.\\n\\nIt could do this by exploiting a mixed case flaw in curl's function that\\nverifies a given cookie domain against the Public Suffix List (PSL). For\\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-46218\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-9086\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-9086\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-27774\",\n                    \"title\" : \"An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-27774\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-32221\",\n                    \"title\" : \"When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-32221\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-10148\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-10148\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-14017\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14017\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15224\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15224\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-27776\",\n                    \"title\" : \"A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-27776\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27533\",\n                    \"title\" : \"A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \\\"telnet options\\\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27533\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27534\",\n                    \"title\" : \"A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-27534\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-28322\",\n                    \"title\" : \"An information disclosure vulnerability exists in curl \u003cv8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-28322\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-38546\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-38546\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-35252\",\n                    \"title\" : \"When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\\\"sister site\\\" to deny service to all siblings.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.1,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2022-35252\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-32207\",\n                    \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2022-32207\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-40896\",\n                    \"title\" : \"In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \\\"checked\\\"). This makes classic XXE attacks possible.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.1,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2024-40896\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-49794\",\n                    \"title\" : \"Libxml: heap use after free (uaf) leads to denial of service (dos)\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.1,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2025-49794\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-49796\",\n                    \"title\" : \"Libxml: type confusion leads to denial of service (dos)\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.1,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2025-49796\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-56171\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-56171\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-40304\",\n                    \"title\" : \"An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-40304\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-24928\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-24928\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-7425\",\n                    \"title\" : \"Libxslt: heap use-after-free in libxslt caused by atype corruption in xmlattrptr\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-7425\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-40303\",\n                    \"title\" : \"An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-40303\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-25062\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-25062\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-32415\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-32415\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-49795\",\n                    \"title\" : \"Libxml: null pointer dereference leads to denial of service (dos)\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-49795\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-6021\",\n                    \"title\" : \"Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-6021\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-7424\",\n                    \"title\" : \"Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-7424\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29824\",\n                    \"title\" : \"In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-29824\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-39615\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-39615\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-9714\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-9714\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-49043\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-49043\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-28484\",\n                    \"title\" : \"In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-28484\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-29469\",\n                    \"title\" : \"An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the '\\\\0' value).\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-29469\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-32414\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-32414\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-6170\",\n                    \"title\" : \"Libxml2: stack buffer overflow in xmllint interactive shell command handling\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 2.5,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2025-6170\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-40896\",\n                    \"title\" : \"In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \\\"checked\\\"). This makes classic XXE attacks possible.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.1,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2024-40896\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-3596\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.0,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2024-3596\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-42898\",\n                    \"title\" : \"PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \\\"a similar bug.\\\"\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-42898\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-39975\",\n                    \"title\" : \"kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-39975\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-26462\",\n                    \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-26462\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-37370\",\n                    \"title\" : \"In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-37370\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2020-17049\",\n                    \"title\" : \"Kerberos KDC Security Feature Bypass Vulnerability\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.2,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2020-17049\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-36054\",\n                    \"title\" : \"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-36054\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-37371\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-37371\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-24528\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-24528\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-26458\",\n                    \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-26458\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-26461\",\n                    \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-26461\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-3576\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-3576\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-3596\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.0,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2024-3596\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15281\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15281\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1271\",\n                    \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1271\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-31115\",\n                    \"title\" : \"XZ has a heap-use-after-free bug in threaded .xz decoder\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-31115\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1271\",\n                    \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1271\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2018-25032\",\n                    \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.2,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2018-25032\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-37434\",\n                    \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-37434\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2018-25032\",\n                    \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.2,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2018-25032\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-5318\",\n                    \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-5318\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5987\",\n                    \"title\" : \"Libssh: invalid return code for chacha20 poly1305 with openssl backend\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-5987\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-48795\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-48795\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2283\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-2283\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6004\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-6004\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-1667\",\n                    \"title\" : \"A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-1667\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6918\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-6918\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-5318\",\n                    \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-5318\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-5318\",\n                    \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-5318\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5987\",\n                    \"title\" : \"Libssh: invalid return code for chacha20 poly1305 with openssl backend\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-5987\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-48795\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-48795\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2283\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-2283\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6004\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-6004\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-1667\",\n                    \"title\" : \"A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-1667\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6918\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-6918\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-5318\",\n                    \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-5318\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-5914\",\n                    \"title\" : \"Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-5914\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-4111\",\n                    \"title\" : \"Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-4111\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-4424\",\n                    \"title\" : \"Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-4424\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-5121\",\n                    \"title\" : \"Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-5121\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-26280\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-26280\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-36227\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-36227\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-57970\",\n                    \"title\" : \"libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-57970\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-25724\",\n                    \"title\" : \"list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-25724\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-5914\",\n                    \"title\" : \"Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-5914\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-2603\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-2603\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2602\",\n                    \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.3,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-2602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-2603\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-2603\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-6965\",\n                    \"title\" : \"Integer Truncation on SQLite\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.7,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-6965\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-7104\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.3,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-7104\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-3277\",\n                    \"title\" : \"An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.3,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-3277\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-35737\",\n                    \"title\" : \"SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-35737\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-6965\",\n                    \"title\" : \"Integer Truncation on SQLite\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.7,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-6965\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-44487\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-44487\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-27135\",\n                    \"title\" : \"nghttp2 Denial of service: Assertion failure due to the missing state validation\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-27135\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-28182\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-28182\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-44487\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-44487\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-6176\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-6176\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-6176\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-6176\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1587\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1587\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-2953\",\n                    \"title\" : \"A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-2953\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-2953\",\n                    \"title\" : \"A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-2953\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-44964\",\n                    \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-44964\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-33099\",\n                    \"title\" : \"An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-33099\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-28805\",\n                    \"title\" : \"singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-28805\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-43519\",\n                    \"title\" : \"Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-43519\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-44964\",\n                    \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-44964\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-35938\",\n                    \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-35938\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-35939\",\n                    \"title\" : \"It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-35939\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-35937\",\n                    \"title\" : \"A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-35937\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-35938\",\n                    \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-35938\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-35938\",\n                    \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-35938\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-35939\",\n                    \"title\" : \"It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-35939\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-35937\",\n                    \"title\" : \"A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-35937\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-35938\",\n                    \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-35938\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-43618\",\n                    \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-43618\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-43618\",\n                    \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-43618\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2020-11023\",\n                    \"title\" : \"Potential XSS vulnerability in jQuery\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-11023\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2020-11023\",\n                    \"title\" : \"Potential XSS vulnerability in jQuery\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-11023\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-46848\",\n                    \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-46848\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-12133\",\n                    \"title\" : \"Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-12133\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-46848\",\n                    \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-46848\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1304\",\n                    \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1304\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1304\",\n                    \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1304\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2019-12900\",\n                    \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.4,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2019-12900\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2019-12900\",\n                    \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.4,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2019-12900\" ],\n                    \"unique\" : false\n                  }\n                } ],\n                \"highestVulnerability\" : {\n                  \"id\" : \"CVE-2025-15467\",\n                  \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 9.8,\n                  \"severity\" : \"CRITICAL\",\n                  \"cves\" : [ \"CVE-2025-15467\" ],\n                  \"unique\" : false\n                }\n              }, {\n                \"ref\" : \"pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=microdnf-3.8.0-2.el8.src.rpm\",\n                \"transitive\" : [ {\n                  \"ref\" : \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-15467\",\n                    \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2025-15467\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1473\",\n                    \"title\" : \"Resource leakage when decoding certificates and keys\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1473\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-3358\",\n                    \"title\" : \"Using a Custom Cipher with NID_undef may lead to NULL encryption\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-3358\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-3602\",\n                    \"title\" : \"X.509 Email Address 4-byte Buffer Overflow\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-3602\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-3786\",\n                    \"title\" : \"X.509 Email Address Variable Length Buffer Overflow\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-3786\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-4450\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-4450\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0215\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0215\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0216\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0216\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0217\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0217\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0401\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0401\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-5363\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-5363\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0286\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0286\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-12797\",\n                    \"title\" : \"RFC7250 handshakes with unauthenticated servers don't abort as expected\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-12797\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69419\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69419\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1292\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1292\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-2068\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-2068\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2650\",\n                    \"title\" : \"Possible DoS translating ASN.1 object identifiers\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-2650\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6129\",\n                    \"title\" : \"POLY1305 MAC implementation corrupts vector registers on PowerPC\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-6129\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69421\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-69421\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-11187\",\n                    \"title\" : \"Improper validation of PBMAC1 parameters in PKCS#12 MAC verification\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-11187\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2020-1971\",\n                    \"title\" : \"EDIPARTYNAME NULL pointer dereference\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-1971\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-4304\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-4304\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0464\",\n                    \"title\" : \"Excessive Resource Usage Verifying X.509 Policy Constraints\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-0464\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6237\",\n                    \"title\" : \"Excessive time spent checking invalid RSA public keys\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-6237\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-5535\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-5535\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-6119\",\n                    \"title\" : \"Possible denial of service in X.509 name checks\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-6119\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15468\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15468\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-66199\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-66199\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69420\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-69420\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-22796\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-22796\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-4741\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-4741\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-9230\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-9230\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-0727\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-0727\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15469\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15469\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-22795\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-22795\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1343\",\n                    \"title\" : \"OCSP_basic_verify may incorrectly verify the response signing certificate\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1343\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-2097\",\n                    \"title\" : \"AES OCB fails to encrypt some bytes\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-2097\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0465\",\n                    \"title\" : \"Invalid certificate policies in leaf certificates are silently ignored\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-0465\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0466\",\n                    \"title\" : \"Certificate policy check not enabled\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-0466\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2975\",\n                    \"title\" : \"AES-SIV implementation ignores empty associated data entries\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-2975\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-3446\",\n                    \"title\" : \"Excessive time spent checking DH keys and parameters\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-3446\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-3817\",\n                    \"title\" : \"Excessive time spent checking DH q parameter value\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-3817\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-5678\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-5678\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-4603\",\n                    \"title\" : \"Excessive time spent checking DSA keys and parameters\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-4603\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-1255\",\n                    \"title\" : \"Input buffer over-read in AES-XTS implementation on 64 bit ARM\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-1255\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-4203\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-4203\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-68160\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-68160\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69418\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-69418\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-2511\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2024-2511\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-15467\",\n                    \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2025-15467\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-32207\",\n                    \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2022-32207\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-22576\",\n                    \"title\" : \"An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-22576\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-38545\",\n                    \"title\" : \"This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\\nhandshake.\\n\\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\\nthat to resolve the address instead of it getting done by curl itself, the\\nmaximum length that host name can be is 255 bytes.\\n\\nIf the host name is detected to be longer, curl switches to local name\\nresolving and instead passes on the resolved address only. Due to this bug,\\nthe local variable that means \\\"let the host resolve the name\\\" could get the\\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\\ncopy the too long host name to the target buffer instead of copying just the\\nresolved address there.\\n\\nThe target buffer being a heap based buffer, and the host name coming from the\\nURL that curl has been told to operate with.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-38545\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-27775\",\n                    \"title\" : \"An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-27775\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-27782\",\n                    \"title\" : \"libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-27782\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-2398\",\n                    \"title\" : \"HTTP/2 push headers memory-leak\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2398\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-32206\",\n                    \"title\" : \"curl \u003c 7.84.0 supports \\\"chained\\\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \\\"malloc bomb\\\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-32206\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-23916\",\n                    \"title\" : \"An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \\\"chained\\\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \\\"malloc bomb\\\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-23916\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-43552\",\n                    \"title\" : \"A use after free vulnerability exists in curl \u003c7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-43552\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27535\",\n                    \"title\" : \"An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27535\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27536\",\n                    \"title\" : \"An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27536\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-28321\",\n                    \"title\" : \"An improper certificate validation vulnerability exists in curl \u003cv8.1.0 in the way it supports matching of wildcard patterns when listed as \\\"Subject Alternative Name\\\" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-28321\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27538\",\n                    \"title\" : \"An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27538\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-32208\",\n                    \"title\" : \"When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-32208\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-46218\",\n                    \"title\" : \"This flaw allows a malicious HTTP server to set \\\"super cookies\\\" in curl that\\nare then passed back to more origins than what is otherwise allowed or\\npossible. This allows a site to set cookies that then would get sent to\\ndifferent and unrelated sites and domains.\\n\\nIt could do this by exploiting a mixed case flaw in curl's function that\\nverifies a given cookie domain against the Public Suffix List (PSL). For\\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-46218\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-9086\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-9086\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-27774\",\n                    \"title\" : \"An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-27774\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-32221\",\n                    \"title\" : \"When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-32221\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-27776\",\n                    \"title\" : \"A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-27776\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27533\",\n                    \"title\" : \"A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \\\"telnet options\\\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27533\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27534\",\n                    \"title\" : \"A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-27534\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-28322\",\n                    \"title\" : \"An information disclosure vulnerability exists in curl \u003cv8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-28322\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-38546\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-38546\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-35252\",\n                    \"title\" : \"When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\\\"sister site\\\" to deny service to all siblings.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.1,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2022-35252\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-32207\",\n                    \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2022-32207\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-32207\",\n                    \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2022-32207\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-22576\",\n                    \"title\" : \"An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-22576\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-38545\",\n                    \"title\" : \"This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\\nhandshake.\\n\\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\\nthat to resolve the address instead of it getting done by curl itself, the\\nmaximum length that host name can be is 255 bytes.\\n\\nIf the host name is detected to be longer, curl switches to local name\\nresolving and instead passes on the resolved address only. Due to this bug,\\nthe local variable that means \\\"let the host resolve the name\\\" could get the\\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\\ncopy the too long host name to the target buffer instead of copying just the\\nresolved address there.\\n\\nThe target buffer being a heap based buffer, and the host name coming from the\\nURL that curl has been told to operate with.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-38545\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15079\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-15079\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-27775\",\n                    \"title\" : \"An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-27775\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-27782\",\n                    \"title\" : \"libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-27782\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-2398\",\n                    \"title\" : \"HTTP/2 push headers memory-leak\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2398\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-13034\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-13034\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-14819\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14819\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-1965\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-1965\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-32206\",\n                    \"title\" : \"curl \u003c 7.84.0 supports \\\"chained\\\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \\\"malloc bomb\\\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-32206\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-23916\",\n                    \"title\" : \"An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \\\"chained\\\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \\\"malloc bomb\\\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-23916\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-14524\",\n                    \"title\" : \"bearer token leak on cross-protocol redirect\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14524\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-3784\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-3784\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-3805\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-3805\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-43552\",\n                    \"title\" : \"A use after free vulnerability exists in curl \u003c7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-43552\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27535\",\n                    \"title\" : \"An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27535\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27536\",\n                    \"title\" : \"An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27536\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-28321\",\n                    \"title\" : \"An improper certificate validation vulnerability exists in curl \u003cv8.1.0 in the way it supports matching of wildcard patterns when listed as \\\"Subject Alternative Name\\\" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-28321\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-10966\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-10966\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-3783\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-3783\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27538\",\n                    \"title\" : \"An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27538\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-32208\",\n                    \"title\" : \"When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-32208\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-46218\",\n                    \"title\" : \"This flaw allows a malicious HTTP server to set \\\"super cookies\\\" in curl that\\nare then passed back to more origins than what is otherwise allowed or\\npossible. This allows a site to set cookies that then would get sent to\\ndifferent and unrelated sites and domains.\\n\\nIt could do this by exploiting a mixed case flaw in curl's function that\\nverifies a given cookie domain against the Public Suffix List (PSL). For\\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-46218\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-9086\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-9086\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-27774\",\n                    \"title\" : \"An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-27774\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-32221\",\n                    \"title\" : \"When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-32221\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-10148\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-10148\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-14017\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14017\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15224\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15224\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-27776\",\n                    \"title\" : \"A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-27776\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27533\",\n                    \"title\" : \"A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \\\"telnet options\\\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-27533\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-27534\",\n                    \"title\" : \"A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-27534\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-28322\",\n                    \"title\" : \"An information disclosure vulnerability exists in curl \u003cv8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-28322\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-38546\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-38546\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-35252\",\n                    \"title\" : \"When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\\\"sister site\\\" to deny service to all siblings.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.1,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2022-35252\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-32207\",\n                    \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.8,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2022-32207\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-40896\",\n                    \"title\" : \"In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \\\"checked\\\"). This makes classic XXE attacks possible.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.1,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2024-40896\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-49794\",\n                    \"title\" : \"Libxml: heap use after free (uaf) leads to denial of service (dos)\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.1,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2025-49794\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-49796\",\n                    \"title\" : \"Libxml: type confusion leads to denial of service (dos)\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.1,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2025-49796\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-56171\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-56171\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-40304\",\n                    \"title\" : \"An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-40304\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-24928\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-24928\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-7425\",\n                    \"title\" : \"Libxslt: heap use-after-free in libxslt caused by atype corruption in xmlattrptr\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-7425\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-40303\",\n                    \"title\" : \"An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-40303\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-25062\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-25062\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-32415\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-32415\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-49795\",\n                    \"title\" : \"Libxml: null pointer dereference leads to denial of service (dos)\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-49795\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-6021\",\n                    \"title\" : \"Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-6021\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-7424\",\n                    \"title\" : \"Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-7424\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29824\",\n                    \"title\" : \"In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-29824\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-39615\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-39615\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-9714\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-9714\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-49043\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-49043\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-28484\",\n                    \"title\" : \"In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-28484\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-29469\",\n                    \"title\" : \"An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the '\\\\0' value).\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-29469\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-32414\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-32414\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-6170\",\n                    \"title\" : \"Libxml2: stack buffer overflow in xmllint interactive shell command handling\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 2.5,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2025-6170\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-40896\",\n                    \"title\" : \"In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \\\"checked\\\"). This makes classic XXE attacks possible.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.1,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2024-40896\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-3596\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.0,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2024-3596\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-42898\",\n                    \"title\" : \"PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \\\"a similar bug.\\\"\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-42898\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-39975\",\n                    \"title\" : \"kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-39975\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-26462\",\n                    \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-26462\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-37370\",\n                    \"title\" : \"In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-37370\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2020-17049\",\n                    \"title\" : \"Kerberos KDC Security Feature Bypass Vulnerability\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.2,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2020-17049\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-36054\",\n                    \"title\" : \"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-36054\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-37371\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-37371\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-24528\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-24528\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-26458\",\n                    \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-26458\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-26461\",\n                    \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-26461\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-3576\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-3576\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-3596\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 9.0,\n                    \"severity\" : \"CRITICAL\",\n                    \"cves\" : [ \"CVE-2024-3596\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15281\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15281\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1271\",\n                    \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1271\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-31115\",\n                    \"title\" : \"XZ has a heap-use-after-free bug in threaded .xz decoder\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-31115\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1271\",\n                    \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1271\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libksba@1.3.5-9.el8_7?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libksba-1.3.5-9.el8_7.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-3515\",\n                    \"title\" : \"A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-3515\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-47629\",\n                    \"title\" : \"Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-47629\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-3515\",\n                    \"title\" : \"A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-3515\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2026-24882\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-24882\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-68973\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-68973\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-34903\",\n                    \"title\" : \"GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-34903\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2026-24882\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-24882\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2018-25032\",\n                    \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.2,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2018-25032\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-37434\",\n                    \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-37434\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2018-25032\",\n                    \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.2,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2018-25032\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-5318\",\n                    \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-5318\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5987\",\n                    \"title\" : \"Libssh: invalid return code for chacha20 poly1305 with openssl backend\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-5987\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-48795\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-48795\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2283\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-2283\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6004\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-6004\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-1667\",\n                    \"title\" : \"A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-1667\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6918\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-6918\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-5318\",\n                    \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-5318\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-5318\",\n                    \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-5318\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5987\",\n                    \"title\" : \"Libssh: invalid return code for chacha20 poly1305 with openssl backend\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-5987\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-48795\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-48795\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2283\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-2283\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6004\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-6004\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-1667\",\n                    \"title\" : \"A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-1667\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-6918\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.7,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-6918\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-5318\",\n                    \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-5318\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-2603\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-2603\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2602\",\n                    \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.3,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-2602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-2603\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-2603\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-5914\",\n                    \"title\" : \"Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-5914\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-4111\",\n                    \"title\" : \"Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-4111\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-4424\",\n                    \"title\" : \"Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-4424\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-5121\",\n                    \"title\" : \"Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-5121\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-26280\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-26280\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-36227\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-36227\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-57970\",\n                    \"title\" : \"libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-57970\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-25724\",\n                    \"title\" : \"list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-25724\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-5914\",\n                    \"title\" : \"Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-5914\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-13601\",\n                    \"title\" : \"Glib: integer overflow in in g_escape_uri_string()\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.7,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-13601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-52533\",\n                    \"title\" : \"gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\\\\0' character.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-52533\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-32611\",\n                    \"title\" : \"G_variant_byteswap() can take a long time with some non-normal inputs\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-32611\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-32665\",\n                    \"title\" : \"Gvariant deserialisation does not match spec for non-normal data\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-32665\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-14512\",\n                    \"title\" : \"Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14512\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-29499\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-29499\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-14087\",\n                    \"title\" : \"Glib: glib: buffer underflow in gvariant parser leads to heap corruption\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14087\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4373\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-4373\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-34397\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.8,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2024-34397\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-13601\",\n                    \"title\" : \"Glib: integer overflow in in g_escape_uri_string()\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.7,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-13601\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-6965\",\n                    \"title\" : \"Integer Truncation on SQLite\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.7,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-6965\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-7104\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.3,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-7104\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-3277\",\n                    \"title\" : \"An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.3,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-3277\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-35737\",\n                    \"title\" : \"SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-35737\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-6965\",\n                    \"title\" : \"Integer Truncation on SQLite\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.7,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-6965\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-33928\",\n                    \"title\" : \"Buffer overflow vulnerability in function pool_installable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-33928\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-33929\",\n                    \"title\" : \"Buffer overflow vulnerability in function pool_disabled_solvable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-33929\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-33930\",\n                    \"title\" : \"Buffer overflow vulnerability in function pool_installable_whatprovides in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-33930\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-33938\",\n                    \"title\" : \"Buffer overflow vulnerability in function prune_to_recommended in src/policy.c in libsolv before 0.7.17 allows attackers to cause a Denial of Service.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-33938\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-46877\",\n                    \"title\" : \"jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-46877\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-28863\",\n                    \"title\" : \"node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-28863\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-44568\",\n                    \"title\" : \"Two heap-overflow vulnerabilities exist in openSUSE/libsolv libsolv through 13 Dec 2020 in the decisionmap variable via the resolve_dependencies function at src/solver.c (line 1940 \u0026 line 1995), which could cause a remote Denial of Service.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-44568\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-3200\",\n                    \"title\" : \"Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.3,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2021-3200\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-33928\",\n                    \"title\" : \"Buffer overflow vulnerability in function pool_installable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-33928\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-6176\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-6176\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-6176\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-6176\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-2509\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-2509\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-0553\",\n                    \"title\" : \"Gnutls: incomplete fix for cve-2023-5981\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-0553\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-0567\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-0567\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-0361\",\n                    \"title\" : \"A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.4,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-0361\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-32988\",\n                    \"title\" : \"Gnutls: vulnerability in gnutls othername san export\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-32988\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-32990\",\n                    \"title\" : \"Gnutls: vulnerability in gnutls certtool template parsing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-32990\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-6395\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-6395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-5981\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-5981\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-12243\",\n                    \"title\" : \"Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-12243\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-28834\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-28834\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-14831\",\n                    \"title\" : \"Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14831\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-32989\",\n                    \"title\" : \"Gnutls: vulnerability in gnutls sct extension parsing\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-32989\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-28835\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-28835\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-9820\",\n                    \"title\" : \"Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-9820\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-2509\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-2509\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-44487\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-44487\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-27135\",\n                    \"title\" : \"nghttp2 Denial of service: Assertion failure due to the missing state validation\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-27135\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-28182\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-28182\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-44487\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-44487\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1587\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1587\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-2953\",\n                    \"title\" : \"A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-2953\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-2953\",\n                    \"title\" : \"A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-2953\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-44964\",\n                    \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-44964\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-33099\",\n                    \"title\" : \"An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-33099\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-28805\",\n                    \"title\" : \"singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-28805\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-43519\",\n                    \"title\" : \"Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-43519\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-44964\",\n                    \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2021-44964\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-35938\",\n                    \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-35938\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-35939\",\n                    \"title\" : \"It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-35939\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-35937\",\n                    \"title\" : \"A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-35937\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-35938\",\n                    \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-35938\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-35938\",\n                    \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-35938\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-35939\",\n                    \"title\" : \"It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-35939\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2021-35937\",\n                    \"title\" : \"A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-35937\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-35938\",\n                    \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-35938\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-43618\",\n                    \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-43618\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-43618\",\n                    \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-43618\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-14104\",\n                    \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14104\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-14104\",\n                    \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14104\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2020-11023\",\n                    \"title\" : \"Potential XSS vulnerability in jQuery\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-11023\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2020-11023\",\n                    \"title\" : \"Potential XSS vulnerability in jQuery\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-11023\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-14104\",\n                    \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14104\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-14104\",\n                    \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14104\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-14104\",\n                    \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14104\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-14104\",\n                    \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14104\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2025-14104\",\n                    \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14104\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-27456\",\n                    \"title\" : \"util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-27456\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2025-14104\",\n                    \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-14104\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2020-11023\",\n                    \"title\" : \"Potential XSS vulnerability in jQuery\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-11023\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2020-11023\",\n                    \"title\" : \"Potential XSS vulnerability in jQuery\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-11023\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2021-46848\",\n                    \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-46848\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-12133\",\n                    \"title\" : \"Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-12133\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2021-46848\",\n                    \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2021-46848\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2236\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-2236\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2236\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-2236\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=systemd-239-82.el8_10.15.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-7008\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-7008\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-3821\",\n                    \"title\" : \"An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3821\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-4415\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-4415\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-45873\",\n                    \"title\" : \"systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-45873\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4598\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.7,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-4598\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-7008\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-7008\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1304\",\n                    \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1304\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1304\",\n                    \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.8,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-1304\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/file-libs@5.33-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=file-5.33-27.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-48554\",\n                    \"title\" : \"File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \\\"File\\\" is the name of an Open Source project.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-48554\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-48554\",\n                    \"title\" : \"File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \\\"File\\\" is the name of an Open Source project.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-48554\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2019-12900\",\n                    \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.4,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2019-12900\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2019-12900\",\n                    \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.4,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2019-12900\" ],\n                    \"unique\" : false\n                  }\n                } ],\n                \"highestVulnerability\" : {\n                  \"id\" : \"CVE-2025-15467\",\n                  \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 9.8,\n                  \"severity\" : \"CRITICAL\",\n                  \"cves\" : [ \"CVE-2025-15467\" ],\n                  \"unique\" : false\n                }\n              }, {\n                \"ref\" : \"pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm\",\n                \"issues\" : [ {\n                  \"id\" : \"CVE-2025-45582\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 5.6,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2025-45582\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2022-48303\",\n                  \"title\" : \"GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 5.5,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2022-48303\" ],\n                  \"unique\" : false\n                } ],\n                \"transitive\" : [ {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15281\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15281\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2018-25032\",\n                    \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.2,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2018-25032\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-37434\",\n                    \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-37434\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2018-25032\",\n                    \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.2,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2018-25032\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1587\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1587\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  }\n                } ],\n                \"highestVulnerability\" : {\n                  \"id\" : \"CVE-2024-2961\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 8.8,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2024-2961\" ],\n                  \"unique\" : false\n                }\n              }, {\n                \"ref\" : \"pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm\",\n                \"transitive\" : [ {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15281\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15281\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1587\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1587\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  }\n                } ],\n                \"highestVulnerability\" : {\n                  \"id\" : \"CVE-2024-2961\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 8.8,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2024-2961\" ],\n                  \"unique\" : false\n                }\n              }, {\n                \"ref\" : \"pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm\",\n                \"transitive\" : [ {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15281\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15281\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1587\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1587\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  }\n                } ],\n                \"highestVulnerability\" : {\n                  \"id\" : \"CVE-2024-2961\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 8.8,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2024-2961\" ],\n                  \"unique\" : false\n                }\n              }, {\n                \"ref\" : \"pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm\",\n                \"transitive\" : [ {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15281\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15281\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\r100 1002k    0  641k  100  360k   821k   462k --:--:-- --:--:-- --:--:-- 1282k\n    \n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1587\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1587\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2019-12900\",\n                    \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.4,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2019-12900\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2019-12900\",\n                    \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.4,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2019-12900\" ],\n                    \"unique\" : false\n                  }\n                } ],\n                \"highestVulnerability\" : {\n                  \"id\" : \"CVE-2024-2961\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 8.8,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2024-2961\" ],\n                  \"unique\" : false\n                }\n              }, {\n                \"ref\" : \"pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm\",\n                \"issues\" : [ {\n                  \"id\" : \"CVE-2023-4641\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 4.7,\n                  \"severity\" : \"MEDIUM\",\n                  \"cves\" : [ \"CVE-2023-4641\" ],\n                  \"unique\" : false\n                }, {\n                  \"id\" : \"CVE-2024-56433\",\n                  \"title\" : \"shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 3.6,\n                  \"severity\" : \"LOW\",\n                  \"cves\" : [ \"CVE-2024-56433\" ],\n                  \"unique\" : false\n                } ],\n                \"transitive\" : [ {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-15281\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-15281\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0861\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.1,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2026-0861\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4911\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-4911\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33599\",\n                    \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.6,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-33599\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-4802\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.0,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-4802\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4527\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4527\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4806\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4806\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-4813\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.9,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2023-4813\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-5702\",\n                    \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-5702\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-0395\",\n                    \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.5,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-0395\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33600\",\n                    \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33600\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2026-0915\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 5.3,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2026-0915\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-8058\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.2,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2025-8058\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33601\",\n                    \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33601\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2024-33602\",\n                    \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.0,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2024-33602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2024-2961\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 8.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2024-2961\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-2603\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-2603\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2023-2602\",\n                    \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 3.3,\n                    \"severity\" : \"LOW\",\n                    \"cves\" : [ \"CVE-2023-2602\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-2603\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-2603\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2025-69720\",\n                    \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2025-69720\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-29458\",\n                    \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-29458\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2023-29491\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.8,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2023-29491\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }, {\n                    \"id\" : \"CVE-2022-1587\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1587\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-1586\",\n                    \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 7.5,\n                    \"severity\" : \"HIGH\",\n                    \"cves\" : [ \"CVE-2022-1586\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2022-3715\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.6,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2022-3715\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2020-11023\",\n                    \"title\" : \"Potential XSS vulnerability in jQuery\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-11023\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2020-11023\",\n                    \"title\" : \"Potential XSS vulnerability in jQuery\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 6.1,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2020-11023\" ],\n                    \"unique\" : false\n                  }\n                }, {\n                  \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n                  \"issues\" : [ {\n                    \"id\" : \"CVE-2019-12900\",\n                    \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.4,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2019-12900\" ],\n                    \"unique\" : false\n                  } ],\n                  \"highestVulnerability\" : {\n                    \"id\" : \"CVE-2019-12900\",\n                    \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                    \"source\" : \"redhat-csaf\",\n                    \"cvssScore\" : 4.4,\n                    \"severity\" : \"MEDIUM\",\n                    \"cves\" : [ \"CVE-2019-12900\" ],\n                    \"unique\" : false\n                  }\n                } ],\n                \"highestVulnerability\" : {\n                  \"id\" : \"CVE-2024-2961\",\n                  \"source\" : \"redhat-csaf\",\n                  \"cvssScore\" : 8.8,\n                  \"severity\" : \"HIGH\",\n                  \"cves\" : [ \"CVE-2024-2961\" ],\n                  \"unique\" : false\n                }\n              } ]\n            }\n          }\n        }\n      },\n      \"licenses\" : [ {\n        \"status\" : {\n          \"ok\" : false,\n          \"name\" : \"deps.dev\",\n          \"code\" : 400,\n          \"message\" : \"Bad Request: invalid purl \\\"pkg:maven/io.github.stuartwdouglas.hacbstest.Main/hacbs-test\\\" at request index 25\",\n          \"warnings\" : { }\n        },\n        \"summary\" : {\n          \"total\" : 1,\n          \"concluded\" : 119,\n          \"permissive\" : 1,\n          \"weakCopyleft\" : 0,\n          \"strongCopyleft\" : 0,\n          \"unknown\" : 0,\n          \"deprecated\" : 0,\n          \"osiApproved\" : 1,\n          \"fsfLibre\" : 1\n        },\n        \"packages\" : {\n          \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/p11-kit@0.23.22-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=p11-kit-0.23.22-2.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libxcrypt@4.1.1-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxcrypt-4.1.1-6.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/sed@4.5-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sed-4.5-5.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/filesystem@3.8-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=filesystem-3.8-6.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nettle-3.4.1-7.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libverto@0.3.2-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libverto-0.3.2-2.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/gpg-pubkey@fd431d51-4ae0493b?distro=rhel-8.10\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/gdbm-libs@1.18-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gdbm-1.18-2.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libunistring@0.9.9-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libunistring-0.9.9-3.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/platform-python@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/json-c@0.13.1-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=json-c-0.13.1-3.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libyaml@0.1.7-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libyaml-0.1.7-5.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libksba@1.3.5-9.el8_7?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libksba-1.3.5-9.el8_7.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/file-libs@5.33-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=file-5.33-27.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libacl@2.2.53-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=acl-2.2.53-3.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/p11-kit-trust@0.23.22-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=p11-kit-0.23.22-2.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libzstd@1.4.4-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zstd-1.4.4-1.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/langpacks-en@1.0-12.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=langpacks-1.0-12.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/keyutils-libs@1.5.10-9.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=keyutils-1.5.10-9.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:github/beatlabs/delete-old-branches-action@v0.0.10\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/findutils@4.6.0-24.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=findutils-4.6.0-24.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libattr@2.4.48-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=attr-2.4.48-3.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/npth@1.5-4.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=npth-1.5-4.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/librepo@1.14.2-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=librepo-1.14.2-5.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/dbus-libs@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/chkconfig@1.19.2-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=chkconfig-1.19.2-1.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/platform-python-setuptools@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/librhsm@0.0.3-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=librhsm-0.0.3-5.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/publicsuffix-list-dafsa@20180723-1.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=publicsuffix-list-20180723-1.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/gpg-pubkey@d4082792-5b32db75?distro=rhel-8.10\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/readline@7.0-10.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=readline-7.0-10.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libdnf@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libusbx-1.0.23-4.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libsigsegv@2.11-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsigsegv-2.11-5.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/ca-certificates@2025.2.80_v9.0.304-80.2.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ca-certificates-2025.2.80_v9.0.304-80.2.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/gawk@4.2.1-4.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gawk-4.2.1-4.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libnsl2@1.2.0-2.20180605git4a062cf.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libnsl2-1.2.0-2.20180605git4a062cf.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/basesystem@11-5.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=basesystem-11-5.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/popt@1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=popt-1.18-1.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libidn2@2.2.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libidn2-2.2.0-1.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/setup@2.12.2-9.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=setup-2.12.2-9.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/tzdata@2026a-1.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=tzdata-2026a-1.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=systemd-239-82.el8_10.15.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/grep@3.1-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=grep-3.1-6.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/mpfr@3.1.6-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=mpfr-3.1.6-1.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/redhat-release@8.10-0.3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=redhat-release-8.10-0.3.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libassuan@2.5.1-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libassuan-2.5.1-3.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/elfutils-libelf@0.190-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=elfutils-0.190-2.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/json-glib@1.4.4-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=json-glib-1.4.4-1.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/gobject-introspection@1.56.1-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gobject-introspection-1.56.1-1.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libselinux@2.9-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libselinux-2.9-11.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libsepol@2.9-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsepol-2.9-3.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:github/actions/checkout@v4\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libgpg-error@1.31-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgpg-error-1.31-1.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/info@6.5-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=texinfo-6.5-7.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libdb-utils@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libpsl@0.20.2-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpsl-0.20.2-6.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/coreutils-single@8.30-17.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=coreutils-8.30-17.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libcap-ng@0.7.11-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-ng-0.7.11-1.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-6.el8_5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cyrus-sasl-2.1.27-6.el8_5.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/crypto-policies@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libffi@3.1-24.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libffi-3.1-24.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/pcre@8.42-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre-8.42-6.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/gdbm@1.18-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gdbm-1.18-2.el8.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/audit-libs@3.1.2-1.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=audit-3.1.2-1.el8_10.1.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:pypi/setuptools@39.2.0\" : {\n            \"concluded\" : {\n              \"identifiers\" : [ {\n                \"id\" : \"MIT\",\n                \"name\" : \"MIT License\",\n                \"isDeprecated\" : false,\n                \"isOsiApproved\" : true,\n                \"isFsfLibre\" : true,\n                \"category\" : \"PERMISSIVE\"\n              } ],\n              \"expression\" : \"MIT\",\n              \"name\" : \"MIT License\",\n              \"category\" : \"PERMISSIVE\",\n              \"source\" : \"deps.dev\",\n              \"sourceUrl\" : \"https://api.deps.dev\"\n            },\n            \"evidence\" : [ {\n              \"identifiers\" : [ {\n                \"id\" : \"MIT\",\n                \"name\" : \"MIT License\",\n                \"isDeprecated\" : false,\n                \"isOsiApproved\" : true,\n                \"isFsfLibre\" : true,\n                \"category\" : \"PERMISSIVE\"\n              } ],\n              \"expression\" : \"MIT\",\n              \"name\" : \"MIT License\",\n              \"category\" : \"PERMISSIVE\",\n              \"source\" : \"deps.dev\",\n              \"sourceUrl\" : \"https://api.deps.dev\"\n            } ]\n          },\n          \"pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          },\n          \"pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\" : {\n            \"evidence\" : [ ]\n          }\n        }\n      } ]\n    }\n    pod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-tpa-scan-pod | container step-oci-attach-report: \n    Using token for quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf\n    Attaching tpa-report-amd64.json to quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf@sha256:ea8744c45dad74236e8bdd06f4f40711dd4ec5771ad5abcd3cd05e6fa0332408\n    [retry] executing: oras attach --no-tty --format go-template=\\{\\{.digest\\}\\} --registry-config /tmp/auth/config.json --artifact-type application/vnd.redhat.tpa-report+json quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf@sha256:ea8744c45dad74236e8bdd06f4f40711dd4ec5771ad5abcd3cd05e6fa0332408 tpa-report-amd64.json:application/vnd.redhat.tpa-report+json\n    \n    pod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-tpa-scan-pod | container step-conftest-vulnerabilities: \n    [\n    \t{\n    \t\t\"filename\": \"/tekton/home/tpa-report-amd64.json\",\n    \t\t\"namespace\": \"required_checks\",\n    \t\t\"successes\": 4,\n    \t\t\"warnings\": [\n    \t\t\t{\n    \t\t\t\t\"msg\": \"Found 6 critical vulnerabilities.\",\n    \t\t\t\t\"metadata\": {\n    \t\t\t\t\t\"details\": {\n    \t\t\t\t\t\t\"description\": \"Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-3596)\",\n    \t\t\t\t\t\t\"name\": \"rhtpa_critical_vulnerabilities\",\n    \t\t\t\t\t\t\"url\": \"https://access.redhat.com/articles/red_hat_vulnerability_tutorial\"\n    \t\t\t\t\t},\n    \t\t\t\t\t\"vulnerabilities_number\": 6\n    \t\t\t\t}\n    \t\t\t},\n    \t\t\t{\n    \t\t\t\t\"msg\": \"Found 115 high vulnerabilities.\",\n    \t\t\t\t\"metadata\": {\n    \t\t\t\t\t\"details\": {\n    \t\t\t\t\t\t\"description\": \"Source: osv-github. Affected dependencies: pkg:pypi/setuptools@39.2.0 [direct] (CVE-2024-6345, CVE-2022-40897); Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [direct] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm [direct] (CVE-2023-2953), pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm [direct] (CVE-2026-21945, CVE-2025-64720, CVE-2025-65018), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/javapackages-filesystem@5.3.0-1.module%2Bel8%2B2447%2B6f56d9a6?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=javapackages-tools-5.3.0-1.module%2Bel8%2B2447%2B6f56d9a6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-48734, CVE-2019-10086), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/cups-libs@2.2.6-67.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=cups-2.2.6-67.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-58060, CVE-2024-47175, CVE-2023-34241), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-2509, CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/lua@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-44964), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-44964), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2025-15079, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-56171, CVE-2022-40304, CVE-2025-24928, CVE-2025-7425, CVE-2022-40303, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424, CVE-2022-29824), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-44964), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2025-15079, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-56171, CVE-2022-40304, CVE-2025-24928, CVE-2025-7425, CVE-2022-40303, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424, CVE-2022-29824), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/libksba@1.3.5-9.el8_7?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libksba-1.3.5-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-3515, CVE-2022-47629), pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-33928, CVE-2021-33929, CVE-2021-33930, CVE-2021-33938, CVE-2021-46877), pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-2509, CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-44964), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587)\",\n    \t\t\t\t\t\t\"name\": \"rhtpa_high_vulnerabilities\",\n    \t\t\t\t\t\t\"url\": \"https://access.redhat.com/articles/red_hat_vulnerability_tutorial\"\n    \t\t\t\t\t},\n    \t\t\t\t\t\"vulnerabilities_number\": 115\n    \t\t\t\t}\n    \t\t\t},\n    \t\t\t{\n    \t\t\t\t\"msg\": \"Found 178 medium vulnerabilities.\",\n    \t\t\t\t\"metadata\": {\n    \t\t\t\t\t\"details\": {\n    \t\t\t\t\t\t\"description\": \"Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [direct] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm [direct] (CVE-2026-21933, CVE-2026-21925), pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [direct] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm [direct] (CVE-2025-45582, CVE-2022-48303), pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm [direct] (CVE-2023-4641), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-pip-9.0.3-24.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/cups-libs@2.2.6-67.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=cups-2.2.6-67.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-26691, CVE-2023-32360, CVE-2025-58364, CVE-2023-32324, CVE-2025-58436, CVE-2024-35235), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/lua@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/dbus-libs@1.12.8-27.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-42010, CVE-2022-42011, CVE-2022-42012, CVE-2023-34969), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/avahi-libs@0.7-27.el8_10.1?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=avahi-0.7-27.el8_10.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-3468, CVE-2023-1981, CVE-2023-38469, CVE-2023-38470, CVE-2023-38471, CVE-2023-38472, CVE-2023-38473, CVE-2021-3502, CVE-2024-52615, CVE-2024-52616), pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=systemd-239-82.el8_10.15.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-pip-9.0.3-24.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/alsa-lib@1.2.10-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=alsa-lib-1.2.10-2.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2026-25068), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-13034, CVE-2025-14819, CVE-2026-1965, CVE-2022-32206, CVE-2023-23916, CVE-2025-14524, CVE-2026-3784, CVE-2026-3805, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2025-10966, CVE-2026-3783, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2025-10148, CVE-2025-14017, CVE-2025-15224, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-26280, CVE-2022-36227, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-13034, CVE-2025-14819, CVE-2026-1965, CVE-2022-32206, CVE-2023-23916, CVE-2025-14524, CVE-2026-3784, CVE-2026-3805, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2025-10966, CVE-2026-3783, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2025-10148, CVE-2025-14017, CVE-2025-15224, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-34903), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-26280, CVE-2022-36227, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-28863, CVE-2021-44568), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=systemd-239-82.el8_10.15.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/file-libs@5.33-27.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=file-5.33-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2019-12900)\",\n    \t\t\t\t\t\t\"name\": \"rhtpa_medium_vulnerabilities\",\n    \t\t\t\t\t\t\"url\": \"https://access.redhat.com/articles/red_hat_vulnerability_tutorial\"\n    \t\t\t\t\t},\n    \t\t\t\t\t\"vulnerabilities_number\": 178\n    \t\t\t\t}\n    \t\t\t},\n    \t\t\t{\n    \t\t\t\t\"msg\": \"Found 14 low vulnerabilities.\",\n    \t\t\t\t\"metadata\": {\n    \t\t\t\t\t\"details\": {\n    \t\t\t\t\t\t\"description\": \"Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [direct] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm [direct] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-6170), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-6170), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-34397), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-3200), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-2602)\",\n    \t\t\t\t\t\t\"name\": \"rhtpa_low_vulnerabilities\",\n    \t\t\t\t\t\t\"url\": \"https://access.redhat.com/articles/red_hat_vulnerability_tutorial\"\n    \t\t\t\t\t},\n    \t\t\t\t\t\"vulnerabilities_number\": 14\n    \t\t\t\t}\n    \t\t\t}\n    \t\t]\n    \t}\n    ]\n    {\"vulnerabilities\":{\"critical\":6,\"high\":115,\"medium\":178,\"low\":14,\"unknown\":0},\"unpatched_vulnerabilities\":{\"critical\":0,\"high\":0,\"medium\":0,\"low\":0,\"unknown\":0}}\n    {\"image\": {\"pullspec\": \"quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf:on-pr-ebd2ecfcc5194afc0e9f78f82c9088ad795372ef\", \"digests\": [\"sha256:ea8744c45dad74236e8bdd06f4f40711dd4ec5771ad5abcd3cd05e6fa0332408\"]}}\n    {\"result\":\"SUCCESS\",\"timestamp\":\"2026-04-20T17:46:39+00:00\",\"note\":\"Task tpa-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by TPA.\",\"namespace\":\"default\",\"successes\":0,\"failures\":0,\"warnings\":0}\n    \n    {\n        s: \"\\n pod: test-comp-pac-forgejo-pbtckf-on-pull-request-djm7b-init-pod | init container: prepare\\n2026/04/20 17:31:03 Entrypoint initialization\\n\\npod: test-comp-pac-forgejo-pbtckf-on-pull-request-djm7b-init-pod | container step-init: \\ntime=\\\"2026-04-20T17:31:07Z\\\" level=info msg=\\\"Using in-cluster config\\\" logger=KubeClient\\ntime=\\\"2026-04-20T17:31:07Z\\\" level=info msg=\\\"[param] enable: false\\\"\\ntime=\\\"2026-04-20T17:31:07Z\\\" level=info msg=\\\"[param] default-http-proxy: squid.caching.svc.cluster.local:3128\\\"\\ntime=\\\"2026-04-20T17:31:07Z\\\" level=info msg=\\\"[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\\\"\\ntime=\\\"2026-04-20T17:31:07Z\\\" level=info msg=\\\"[param] http-proxy-result-path: /tekton/results/http-proxy\\\"\\ntime=\\\"2026-04-20T17:31:07Z\\\" level=info msg=\\\"[param] no-proxy-result-path: /tekton/results/no-proxy\\\"\\ntime=\\\"2026-04-20T17:31:07Z\\\" level=info msg=\\\"Cache proxy is disabled in param or in backend\\\"\\ntime=\\\"2026-04-20T17:31:07Z\\\" level=info msg=\\\"[result] HTTP PROXY: \\\"\\ntime=\\\"2026-04-20T17:31:07Z\\\" level=info msg=\\\"[result] NO PROXY: \\\"\\n\\n pod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-init-pod | init container: prepare\\n2026/04/20 17:42:00 Entrypoint initialization\\n\\npod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-init-pod | container step-init: \\ntime=\\\"2026-04-20T17:42:03Z\\\" level=info msg=\\\"Using in-cluster config\\\" logger=KubeClient\\ntime=\\\"2026-04-20T17:42:03Z\\\" level=info msg=\\\"[param] enable: false\\\"\\ntime=\\\"2026-04-20T17:42:03Z\\\" level=info msg=\\\"[param] default-http-proxy: squid.caching.svc.cluster.local:3128\\\"\\ntime=\\\"2026-04-20T17:42:03Z\\\" level=info msg=\\\"[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\\\"\\ntime=\\\"2026-04-20T17:42:03Z\\\" level=info msg=\\\"[param] http-proxy-result-path: /tekton/results/http-proxy\\\"\\ntime=\\\"2026-04-20T17:42:03Z\\\" level=info msg=\\\"[param] no-proxy-result-path: /tekton/results/no-proxy\\\"\\ntime=\\\"2026-04-20T17:42:03Z\\\" level=info msg=\\\"Cache proxy is disabled in param or in backend\\\"\\ntime=\\\"2026-04-20T17:42:03Z\\\" level=info msg=\\\"[result] HTTP PROXY: \\\"\\ntime=\\\"2026-04-20T17:42:03Z\\\" level=info msg=\\\"[result] NO PROXY: \\\"\\n\\n pod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-tpa-scan-pod | init container: prepare\\n2026/04/20 17:46:26 Entrypoint initialization\\n\\n pod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-tpa-scan-pod | init container: place-scripts\\n2026/04/20 17:46:27 Decoded script /tekton/scripts/script-0-pkk24\\n2026/04/20 17:46:27 Decoded script /tekton/scripts/script-1-666sl\\n2026/04/20 17:46:27 Decoded script /tekton/scripts/script-2-nbnf2\\n\\npod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-tpa-scan-pod | container step-get-vulnerabilities: \\nInspecting raw image manifest quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf@sha256:ea8744c45dad74236e8bdd06f4f40711dd4ec5771ad5abcd3cd05e6fa0332408.\\nSelecting auth\\nUsing token for quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf\\nSelecting auth\\nUsing token for quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf\\nWARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.\\nWARNING: Downloading SBOMs this way does not ensure its authenticity. If you want to ensure a tamper-proof SBOM, download it using 'cosign download attestation \u003cimage uri\u003e'.\\nFound S...\n\nGomega truncated this representation as it exceeds 'format.MaxLength'.\nConsider having the object provide a custom 'GomegaStringer' representation\nor adjust the parameters in Gomega's 'format' package.\n\nLearn more here: https://onsi.github.io/gomega/#adjusting-output\n",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 216,
            "FullStackTrace": "github.com/konflux-ci/e2e-tests/tests/integration-service.init.func1.1.3.4()\n\t/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go:216 +0x98"
          },
          "TimelineLocation": {
            "Offset": 1557853,
            "Order": 20,
            "Time": "2026-04-20T17:49:56.430409168Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 214
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 1,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0,
        "CapturedGinkgoWriterOutput": "PipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-4xc9s found for Component forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-4xc9s reason: Cancelled\nattempt 1/3: PipelineRun \"test-comp-pac-forgejo-pbtckf-on-pull-request-4xc9s\" failed: \n pod: test-comp-pac-forgejo-pbtckf-on-pull-request-djm7b-init-pod | init container: prepare\n2026/04/20 17:31:03 Entrypoint initialization\n\npod: test-comp-pac-forgejo-pbtckf-on-pull-request-djm7b-init-pod | container step-init: \ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"Using in-cluster config\" logger=KubeClient\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] enable: false\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] default-http-proxy: squid.caching.svc.cluster.local:3128\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] http-proxy-result-path: /tekton/results/http-proxy\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] no-proxy-result-path: /tekton/results/no-proxy\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"Cache proxy is disabled in param or in backend\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[result] HTTP PROXY: \"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[result] NO PROXY: \"\nNew PipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-djm7b found after retrigger for component forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 found for Component forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: PipelineRunStopping\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: PipelineRunStopping\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: PipelineRunStopping\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: PipelineRunStopping\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: PipelineRunStopping\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: PipelineRunStopping\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: PipelineRunStopping\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4 reason: Failed\nattempt 2/3: PipelineRun \"test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4\" failed: \n pod: test-comp-pac-forgejo-pbtckf-on-pull-request-djm7b-init-pod | init container: prepare\n2026/04/20 17:31:03 Entrypoint initialization\n\npod: test-comp-pac-forgejo-pbtckf-on-pull-request-djm7b-init-pod | container step-init: \ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"Using in-cluster config\" logger=KubeClient\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] enable: false\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] default-http-proxy: squid.caching.svc.cluster.local:3128\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] http-proxy-result-path: /tekton/results/http-proxy\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] no-proxy-result-path: /tekton/results/no-proxy\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"Cache proxy is disabled in param or in backend\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[result] HTTP PROXY: \"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[result] NO PROXY: \"\n\n pod: test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4-init-pod | init container: prepare\n2026/04/20 17:31:24 Entrypoint initialization\n\npod: test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4-init-pod | container step-init: \ntime=\"2026-04-20T17:31:27Z\" level=info msg=\"Using in-cluster config\" logger=KubeClient\ntime=\"2026-04-20T17:31:27Z\" level=info msg=\"[param] enable: false\"\ntime=\"2026-04-20T17:31:27Z\" level=info msg=\"[param] default-http-proxy: squid.caching.svc.cluster.local:3128\"\ntime=\"2026-04-20T17:31:27Z\" level=info msg=\"[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\"\ntime=\"2026-04-20T17:31:27Z\" level=info msg=\"[param] http-proxy-result-path: /tekton/results/http-proxy\"\ntime=\"2026-04-20T17:31:27Z\" level=info msg=\"[param] no-proxy-result-path: /tekton/results/no-proxy\"\ntime=\"2026-04-20T17:31:27Z\" level=info msg=\"Cache proxy is disabled in param or in backend\"\ntime=\"2026-04-20T17:31:27Z\" level=info msg=\"[result] HTTP PROXY: \"\ntime=\"2026-04-20T17:31:27Z\" level=info msg=\"[result] NO PROXY: \"\n\n pod: test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4-tpa-scan-pod | init container: prepare\n2026/04/20 17:38:17 Entrypoint initialization\n\n pod: test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4-tpa-scan-pod | init container: place-scripts\n2026/04/20 17:38:18 Decoded script /tekton/scripts/script-0-h5dm9\n2026/04/20 17:38:18 Decoded script /tekton/scripts/script-1-nkrjw\n2026/04/20 17:38:18 Decoded script /tekton/scripts/script-2-spmp8\n\npod: test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4-tpa-scan-pod | container step-get-vulnerabilities: \nInspecting raw image manifest quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf@sha256:b8b4bb880469e09b8a76f2c2cbe79428ac097fb3aa1bb16d3e20683a21ac7401.\nSelecting auth\nUsing token for quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf\nSelecting auth\nUsing token for quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf\nWARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.\nWARNING: Downloading SBOMs this way does not ensure its authenticity. If you want to ensure a tamper-proof SBOM, download it using 'cosign download attestation \u003cimage uri\u003e'.\nFound SBOM of media type: text/spdx+json\nRunning TPA scan on amd64 image manifest...\n  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current\n                                 Dload  Upload   Total   Spent    Left  Speed\n\r  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0\r100  360k    0     0  100  360k      0   297k  0:00:01  0:00:01 --:--:--  297k\r100  360k    0     0  100  360k      0   162k  0:00:02  0:00:02 --:--:--  162k\r100  360k    0     0  100  360k      0   112k  0:00:03  0:00:03 --:--:--  112k\r100  360k    0     0  100  360k      0  87656  0:00:04  0:00:04 --:--:-- 87656\r100  360k    0     0  100  360k      0  70841  0:00:05  0:00:05 --:--:-- 70841\r100  360k    0     0  100  360k      0  64793  0:00:05  0:00:05 --:--:--     0{\n  \"scanned\" : {\n    \"total\" : 152,\n    \"direct\" : 25,\n    \"transitive\" : 127\n  },\n  \"providers\" : {\n    \"rhtpa\" : {\n      \"status\" : {\n        \"ok\" : true,\n        \"name\" : \"rhtpa\",\n        \"code\" : 200,\n        \"message\" : \"OK\",\n        \"warnings\" : {\n          \"pkg:maven/io.github.stuartwdouglas.hacbstest.Main/hacbs-test\" : [ \"Unable to process: missing version component\" ]\n        }\n      },\n      \"sources\" : {\n        \"osv-github\" : {\n          \"summary\" : {\n            \"direct\" : 2,\n            \"transitive\" : 0,\n            \"total\" : 2,\n            \"dependencies\" : 1,\n            \"critical\" : 0,\n            \"high\" : 2,\n            \"medium\" : 0,\n            \"low\" : 0,\n            \"remediations\" : 0,\n            \"recommendations\" : 0,\n            \"unscanned\" : 0\n          },\n          \"dependencies\" : [ {\n            \"ref\" : \"pkg:pypi/setuptools@39.2.0\",\n            \"issues\" : [ {\n              \"id\" : \"CVE-2024-6345\",\n              \"source\" : \"osv-github\",\n              \"cvssScore\" : 8.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-6345\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2022-40897\",\n              \"source\" : \"osv-github\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2022-40897\" ],\n              \"unique\" : false\n            } ],\n            \"transitive\" : [ ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2024-6345\",\n              \"source\" : \"osv-github\",\n              \"cvssScore\" : 8.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-6345\" ],\n              \"unique\" : false\n            }\n          } ]\n        },\n        \"redhat-csaf\" : {\n          \"summary\" : {\n            \"direct\" : 50,\n            \"transitive\" : 338,\n            \"total\" : 388,\n            \"dependencies\" : 57,\n            \"critical\" : 7,\n            \"high\" : 134,\n            \"medium\" : 228,\n            \"low\" : 19,\n            \"remediations\" : 0,\n            \"recommendations\" : 0,\n            \"unscanned\" : 0\n          },\n          \"dependencies\" : [ {\n            \"ref\" : \"pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm\",\n            \"issues\" : [ {\n              \"id\" : \"CVE-2023-40217\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 8.6,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2023-40217\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2022-42919\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2022-42919\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2023-6597\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2023-6597\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2015-20107\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.6,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2015-20107\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-12718\",\n              \"title\" : \"Bypass extraction filter to modify file metadata outside extraction directory\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.6,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-12718\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-4517\",\n              \"title\" : \"Arbitrary writes via tarfile realpath overflow\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.6,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-4517\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2020-10735\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2020-10735\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2022-45061\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2022-45061\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2023-24329\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2023-24329\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-6232\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-6232\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-12084\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-12084\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-4138\",\n              \"title\" : \"Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-4138\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-4435\",\n              \"title\" : \"Tarfile extracts filtered members when errorlevel=0\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-4435\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-8194\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-8194\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2021-28861\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.4,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2021-28861\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-4330\",\n              \"title\" : \"Extraction filter bypass for linking outside extraction directory\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.3,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-4330\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-15366\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.1,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-15366\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-15367\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.1,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-15367\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2026-1299\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.1,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2026-1299\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2026-4519\",\n              \"title\" : \"webbrowser.open() allows leading dashes in URLs\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.1,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2026-4519\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-6923\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.8,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2024-6923\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-0938\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.8,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2025-0938\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-13836\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.8,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2025-13836\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-9287\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.3,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2024-9287\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-0450\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.2,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2024-0450\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2007-4559\",\n              \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 5.5,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2007-4559\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2023-27043\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 5.3,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2023-27043\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-8088\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 5.3,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2024-8088\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-0397\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 5.0,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2024-0397\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-7592\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 4.8,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2024-7592\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2026-0865\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 4.5,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2026-0865\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-6069\",\n              \"title\" : \"HTMLParser quadratic complexity when processing malformed inputs\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 4.3,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2025-6069\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-8291\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 4.3,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2025-8291\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-6075\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 4.0,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2025-6075\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-11168\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 3.7,\n              \"severity\" : \"LOW\",\n              \"cves\" : [ \"CVE-2024-11168\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-4032\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 3.7,\n              \"severity\" : \"LOW\",\n              \"cves\" : [ \"CVE-2024-4032\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-5642\",\n              \"title\" : \"Buffer overread when using an empty list with SSLContext.set_npn_protocols()\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 2.7,\n              \"severity\" : \"LOW\",\n              \"cves\" : [ \"CVE-2024-5642\" ],\n              \"unique\" : false\n            } ],\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1473\",\n                \"title\" : \"Resource leakage when decoding certificates and keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1473\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3358\",\n                \"title\" : \"Using a Custom Cipher with NID_undef may lead to NULL encryption\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3358\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3602\",\n                \"title\" : \"X.509 Email Address 4-byte Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3602\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3786\",\n                \"title\" : \"X.509 Email Address Variable Length Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3786\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4450\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-4450\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0215\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0215\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0216\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0216\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0217\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0401\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0401\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5363\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-5363\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0286\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0286\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12797\",\n                \"title\" : \"RFC7250 handshakes with unauthenticated servers don't abort as expected\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-12797\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69419\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69419\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1292\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1292\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2068\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2068\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2650\",\n                \"title\" : \"Possible DoS translating ASN.1 object identifiers\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2650\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6129\",\n                \"title\" : \"POLY1305 MAC implementation corrupts vector registers on PowerPC\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6129\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69421\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69421\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-11187\",\n                \"title\" : \"Improper validation of PBMAC1 parameters in PKCS#12 MAC verification\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-11187\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-1971\",\n                \"title\" : \"EDIPARTYNAME NULL pointer dereference\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-1971\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4304\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4304\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0464\",\n                \"title\" : \"Excessive Resource Usage Verifying X.509 Policy Constraints\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0464\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6237\",\n                \"title\" : \"Excessive time spent checking invalid RSA public keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6237\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-5535\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-5535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6119\",\n                \"title\" : \"Possible denial of service in X.509 name checks\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-6119\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15468\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15468\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-66199\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-66199\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69420\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69420\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22796\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22796\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4741\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4741\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9230\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9230\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0727\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0727\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15469\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15469\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1343\",\n                \"title\" : \"OCSP_basic_verify may incorrectly verify the response signing certificate\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1343\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2097\",\n                \"title\" : \"AES OCB fails to encrypt some bytes\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2097\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0465\",\n                \"title\" : \"Invalid certificate policies in leaf certificates are silently ignored\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0465\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0466\",\n                \"title\" : \"Certificate policy check not enabled\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0466\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2975\",\n                \"title\" : \"AES-SIV implementation ignores empty associated data entries\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3446\",\n                \"title\" : \"Excessive time spent checking DH keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3446\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3817\",\n                \"title\" : \"Excessive time spent checking DH q parameter value\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3817\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5678\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-5678\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4603\",\n                \"title\" : \"Excessive time spent checking DSA keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1255\",\n                \"title\" : \"Input buffer over-read in AES-XTS implementation on 64 bit ARM\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1255\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4203\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4203\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-68160\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-68160\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69418\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69418\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2511\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-2511\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42898\",\n                \"title\" : \"PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \\\"a similar bug.\\\"\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-42898\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-39975\",\n                \"title\" : \"kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-39975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26462\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-26462\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37370\",\n                \"title\" : \"In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-37370\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-17049\",\n                \"title\" : \"Kerberos KDC Security Feature Bypass Vulnerability\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2020-17049\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-36054\",\n                \"title\" : \"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-36054\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37371\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-37371\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-24528\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-24528\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26458\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26458\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26461\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26461\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3576\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-3576\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-6345\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-6345\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-47273\",\n                \"title\" : \"setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-47273\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-40897\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-40897\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-6345\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-6345\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1271\",\n                \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1271\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-31115\",\n                \"title\" : \"XZ has a heap-use-after-free bug in threaded .xz decoder\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-31115\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1271\",\n                \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1271\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-40217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-40217\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42919\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-42919\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6597\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-6597\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2015-20107\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2015-20107\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12718\",\n                \"title\" : \"Bypass extraction filter to modify file metadata outside extraction directory\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-12718\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4517\",\n                \"title\" : \"Arbitrary writes via tarfile realpath overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4517\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-10735\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2020-10735\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-45061\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-45061\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-24329\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-24329\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6232\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-6232\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-12084\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-12084\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4138\",\n                \"title\" : \"Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4138\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4435\",\n                \"title\" : \"Tarfile extracts filtered members when errorlevel=0\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4435\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8194\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-8194\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-28861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-28861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4330\",\n                \"title\" : \"Extraction filter bypass for linking outside extraction directory\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4330\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15366\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-15366\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15367\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-15367\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-1299\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-1299\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-4519\",\n                \"title\" : \"webbrowser.open() allows leading dashes in URLs\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-4519\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6923\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-6923\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0938\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0938\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-13836\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-13836\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-9287\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-9287\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0450\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0450\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2007-4559\",\n                \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2007-4559\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27043\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27043\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-8088\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-8088\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0397\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0397\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-7592\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-7592\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0865\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0865\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6069\",\n                \"title\" : \"HTMLParser quadratic complexity when processing malformed inputs\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-6069\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8291\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8291\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6075\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-6075\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-11168\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-11168\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4032\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-4032\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-5642\",\n                \"title\" : \"Buffer overread when using an empty list with SSLContext.set_npn_protocols()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 2.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-5642\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-40217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-40217\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-37434\",\n                \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-37434\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2602\",\n                \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.3,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-2602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-6965\",\n                \"title\" : \"Integer Truncation on SQLite\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6965\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-7104\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-7104\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3277\",\n                \"title\" : \"An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-3277\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-35737\",\n                \"title\" : \"SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-35737\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-6965\",\n                \"title\" : \"Integer Truncation on SQLite\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6965\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-52425\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-52425\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28757\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-28757\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-45490\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-45490\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-45491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-45491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-8176\",\n                \"title\" : \"Libexpat: expat: improper restriction of xml entity expansion depth in libexpat\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-8176\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-45492\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-45492\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-50602\",\n                \"title\" : \"An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-50602\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-59375\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-59375\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-52425\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-52425\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-46828\",\n                \"title\" : \"In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-46828\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-46828\",\n                \"title\" : \"In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-46828\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12133\",\n                \"title\" : \"Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-12133\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2007-4559\",\n                \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2007-4559\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2007-4559\",\n                \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2007-4559\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2025-15467\",\n              \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 9.8,\n              \"severity\" : \"CRITICAL\",\n              \"cves\" : [ \"CVE-2025-15467\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm\",\n            \"issues\" : [ {\n              \"id\" : \"CVE-2023-2953\",\n              \"title\" : \"A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.1,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2023-2953\" ],\n              \"unique\" : false\n            } ],\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1473\",\n                \"title\" : \"Resource leakage when decoding certificates and keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1473\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3358\",\n                \"title\" : \"Using a Custom Cipher with NID_undef may lead to NULL encryption\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3358\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3602\",\n                \"title\" : \"X.509 Email Address 4-byte Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3602\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3786\",\n                \"title\" : \"X.509 Email Address Variable Length Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3786\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4450\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-4450\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0215\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0215\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0216\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0216\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0217\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0401\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0401\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5363\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-5363\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0286\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0286\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12797\",\n                \"title\" : \"RFC7250 handshakes with unauthenticated servers don't abort as expected\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-12797\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69419\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69419\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1292\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1292\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2068\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2068\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2650\",\n                \"title\" : \"Possible DoS translating ASN.1 object identifiers\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2650\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6129\",\n                \"title\" : \"POLY1305 MAC implementation corrupts vector registers on PowerPC\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6129\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69421\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69421\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-11187\",\n                \"title\" : \"Improper validation of PBMAC1 parameters in PKCS#12 MAC verification\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-11187\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-1971\",\n                \"title\" : \"EDIPARTYNAME NULL pointer dereference\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-1971\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4304\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4304\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0464\",\n                \"title\" : \"Excessive Resource Usage Verifying X.509 Policy Constraints\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0464\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6237\",\n                \"title\" : \"Excessive time spent checking invalid RSA public keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6237\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-5535\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-5535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6119\",\n                \"title\" : \"Possible denial of service in X.509 name checks\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-6119\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15468\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15468\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-66199\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-66199\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69420\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69420\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22796\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22796\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4741\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4741\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9230\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9230\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0727\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0727\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15469\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15469\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1343\",\n                \"title\" : \"OCSP_basic_verify may incorrectly verify the response signing certificate\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1343\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2097\",\n                \"title\" : \"AES OCB fails to encrypt some bytes\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2097\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0465\",\n                \"title\" : \"Invalid certificate policies in leaf certificates are silently ignored\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0465\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0466\",\n                \"title\" : \"Certificate policy check not enabled\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0466\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2975\",\n                \"title\" : \"AES-SIV implementation ignores empty associated data entries\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3446\",\n                \"title\" : \"Excessive time spent checking DH keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3446\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3817\",\n                \"title\" : \"Excessive time spent checking DH q parameter value\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3817\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5678\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-5678\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4603\",\n                \"title\" : \"Excessive time spent checking DSA keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1255\",\n                \"title\" : \"Input buffer over-read in AES-XTS implementation on 64 bit ARM\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1255\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4203\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4203\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-68160\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-68160\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69418\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69418\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2511\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-2511\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42898\",\n                \"title\" : \"PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \\\"a similar bug.\\\"\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-42898\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-39975\",\n                \"title\" : \"kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-39975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26462\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-26462\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37370\",\n                \"title\" : \"In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-37370\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-17049\",\n                \"title\" : \"Kerberos KDC Security Feature Bypass Vulnerability\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2020-17049\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-36054\",\n                \"title\" : \"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-36054\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37371\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-37371\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-24528\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-24528\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26458\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26458\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26461\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26461\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3576\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-3576\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-37434\",\n                \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-37434\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2602\",\n                \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.3,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-2602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12133\",\n                \"title\" : \"Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-12133\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2025-15467\",\n              \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 9.8,\n              \"severity\" : \"CRITICAL\",\n              \"cves\" : [ \"CVE-2025-15467\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm\",\n            \"issues\" : [ {\n              \"id\" : \"CVE-2026-21945\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2026-21945\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-64720\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.1,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-64720\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-65018\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.1,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-65018\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2026-21933\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.1,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2026-21933\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2026-21925\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 4.8,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2026-21925\" ],\n              \"unique\" : false\n            } ],\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1473\",\n                \"title\" : \"Resource leakage when decoding certificates and keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1473\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3358\",\n                \"title\" : \"Using a Custom Cipher with NID_undef may lead to NULL encryption\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3358\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3602\",\n                \"title\" : \"X.509 Email Address 4-byte Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3602\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3786\",\n                \"title\" : \"X.509 Email Address Variable Length Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3786\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4450\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-4450\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0215\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0215\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0216\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0216\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0217\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0401\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0401\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5363\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-5363\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0286\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0286\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12797\",\n                \"title\" : \"RFC7250 handshakes with unauthenticated servers don't abort as expected\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-12797\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69419\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69419\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1292\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1292\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2068\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2068\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2650\",\n                \"title\" : \"Possible DoS translating ASN.1 object identifiers\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2650\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6129\",\n                \"title\" : \"POLY1305 MAC implementation corrupts vector registers on PowerPC\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6129\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69421\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69421\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-11187\",\n                \"title\" : \"Improper validation of PBMAC1 parameters in PKCS#12 MAC verification\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-11187\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-1971\",\n                \"title\" : \"EDIPARTYNAME NULL pointer dereference\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-1971\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4304\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4304\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0464\",\n                \"title\" : \"Excessive Resource Usage Verifying X.509 Policy Constraints\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0464\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6237\",\n                \"title\" : \"Excessive time spent checking invalid RSA public keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6237\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-5535\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-5535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6119\",\n                \"title\" : \"Possible denial of service in X.509 name checks\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-6119\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15468\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15468\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-66199\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-66199\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69420\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69420\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22796\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22796\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4741\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4741\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9230\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9230\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0727\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0727\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15469\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15469\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1343\",\n                \"title\" : \"OCSP_basic_verify may incorrectly verify the response signing certificate\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1343\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2097\",\n                \"title\" : \"AES OCB fails to encrypt some bytes\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2097\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0465\",\n                \"title\" : \"Invalid certificate policies in leaf certificates are silently ignored\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0465\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0466\",\n                \"title\" : \"Certificate policy check not enabled\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0466\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2975\",\n                \"title\" : \"AES-SIV implementation ignores empty associated data entries\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3446\",\n                \"title\" : \"Excessive time spent checking DH keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3446\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3817\",\n                \"title\" : \"Excessive time spent checking DH q parameter value\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3817\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5678\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-5678\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4603\",\n                \"title\" : \"Excessive time spent checking DSA keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1255\",\n                \"title\" : \"Input buffer over-read in AES-XTS implementation on 64 bit ARM\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1255\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4203\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4203\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-68160\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-68160\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69418\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69418\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2511\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-2511\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42898\",\n                \"title\" : \"PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \\\"a similar bug.\\\"\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-42898\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-39975\",\n                \"title\" : \"kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-39975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26462\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-26462\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37370\",\n                \"title\" : \"In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-37370\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-17049\",\n                \"title\" : \"Kerberos KDC Security Feature Bypass Vulnerability\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2020-17049\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-36054\",\n                \"title\" : \"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-36054\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37371\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-37371\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-24528\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-24528\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26458\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26458\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26461\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26461\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3576\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-3576\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-6345\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-6345\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-47273\",\n                \"title\" : \"setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-47273\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-40897\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-40897\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-6345\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-6345\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/javapackages-filesystem@5.3.0-1.module%2Bel8%2B2447%2B6f56d9a6?arch=noarch\u0026distro=rhel-8.10\u0026upstream=javapackages-tools-5.3.0-1.module%2Bel8%2B2447%2B6f56d9a6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-48734\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-48734\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2019-10086\",\n                \"title\" : \"In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2019-10086\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-48734\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-48734\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1271\",\n                \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1271\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-31115\",\n                \"title\" : \"XZ has a heap-use-after-free bug in threaded .xz decoder\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-31115\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1271\",\n                \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1271\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-40217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-40217\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42919\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-42919\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6597\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-6597\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2015-20107\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2015-20107\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12718\",\n                \"title\" : \"Bypass extraction filter to modify file metadata outside extraction directory\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-12718\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4517\",\n                \"title\" : \"Arbitrary writes via tarfile realpath overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4517\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-10735\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2020-10735\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-45061\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-45061\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-24329\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-24329\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6232\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-6232\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-12084\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-12084\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4138\",\n                \"title\" : \"Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4138\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4435\",\n                \"title\" : \"Tarfile extracts filtered members when errorlevel=0\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4435\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8194\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-8194\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-28861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-28861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4330\",\n                \"title\" : \"Extraction filter bypass for linking outside extraction directory\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4330\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15366\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-15366\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15367\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-15367\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-1299\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-1299\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-4519\",\n                \"title\" : \"webbrowser.open() allows leading dashes in URLs\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-4519\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6923\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-6923\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0938\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0938\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-13836\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-13836\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-9287\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-9287\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0450\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0450\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2007-4559\",\n                \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2007-4559\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27043\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27043\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-8088\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-8088\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0397\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0397\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-7592\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-7592\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0865\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0865\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6069\",\n                \"title\" : \"HTMLParser quadratic complexity when processing malformed inputs\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-6069\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8291\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8291\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6075\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-6075\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-11168\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-11168\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4032\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-4032\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-5642\",\n                \"title\" : \"Buffer overread when using an empty list with SSLContext.set_npn_protocols()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 2.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-5642\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-40217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-40217\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-37434\",\n                \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-37434\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/cups-libs@2.2.6-67.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=cups-2.2.6-67.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-58060\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-58060\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-47175\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-47175\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-34241\",\n                \"title\" : \"CUPS vulnerable to use-after-free in cupsdAcceptClient()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-34241\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-26691\",\n                \"title\" : \"A logic issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. An application may be able to gain elevated privileges.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-26691\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-32360\",\n                \"title\" : \"An authentication issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. An unauthenticated user may be able to access recently printed documents.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-32360\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-58364\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-58364\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-32324\",\n                \"title\" : \"OpenPrinting CUPS vulnerable to heap buffer overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-32324\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-58436\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-58436\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-35235\",\n                \"title\" : \"Cupsd Listen arbitrary chmod 0140777\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-35235\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-58060\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-58060\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2602\",\n                \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.3,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-2602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-6965\",\n                \"title\" : \"Integer Truncation on SQLite\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6965\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-7104\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-7104\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3277\",\n                \"title\" : \"An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-3277\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-35737\",\n                \"title\" : \"SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-35737\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-6965\",\n                \"title\" : \"Integer Truncation on SQLite\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6965\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-52425\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-52425\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28757\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-28757\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-45490\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-45490\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-45491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-45491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-8176\",\n                \"title\" : \"Libexpat: expat: improper restriction of xml entity expansion depth in libexpat\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-8176\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-45492\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-45492\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-50602\",\n                \"title\" : \"An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-50602\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-59375\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-59375\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-52425\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-52425\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-2509\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-2509\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0553\",\n                \"title\" : \"Gnutls: incomplete fix for cve-2023-5981\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-0553\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0567\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-0567\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0361\",\n                \"title\" : \"A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0361\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32988\",\n                \"title\" : \"Gnutls: vulnerability in gnutls othername san export\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-32988\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32990\",\n                \"title\" : \"Gnutls: vulnerability in gnutls certtool template parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-32990\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6395\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-6395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5981\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-5981\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12243\",\n                \"title\" : \"Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-12243\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28834\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-28834\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14831\",\n                \"title\" : \"Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14831\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32989\",\n                \"title\" : \"Gnutls: vulnerability in gnutls sct extension parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-32989\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28835\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-28835\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9820\",\n                \"title\" : \"Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9820\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-2509\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-2509\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-46828\",\n                \"title\" : \"In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-46828\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-46828\",\n                \"title\" : \"In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-46828\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/lua@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-44964\",\n                \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-44964\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-33099\",\n                \"title\" : \"An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-33099\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-28805\",\n                \"title\" : \"singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-28805\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-43519\",\n                \"title\" : \"Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43519\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-44964\",\n                \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-44964\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-44964\",\n                \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-44964\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-33099\",\n                \"title\" : \"An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-33099\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-28805\",\n                \"title\" : \"singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-28805\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-43519\",\n                \"title\" : \"Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43519\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-44964\",\n                \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-44964\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/dbus-libs@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-42010\",\n                \"title\" : \"An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-42010\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42011\",\n                \"title\" : \"An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-42011\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42012\",\n                \"title\" : \"An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-42012\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-34969\",\n                \"title\" : \"D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-34969\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-42010\",\n                \"title\" : \"An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-42010\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/avahi-libs@0.7-27.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=avahi-0.7-27.el8_10.1.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-3468\",\n                \"title\" : \"A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-3468\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1981\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1981\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38469\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-38469\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38470\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-38470\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38471\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-38471\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38472\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-38472\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38473\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-38473\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-3502\",\n                \"title\" : \"A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-3502\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-52615\",\n                \"title\" : \"Avahi: avahi wide-area dns uses constant source port\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-52615\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-52616\",\n                \"title\" : \"Avahi: avahi wide-area dns predictable transaction ids\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-52616\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-3468\",\n                \"title\" : \"A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-3468\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-27456\",\n                \"title\" : \"util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-27456\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=systemd-239-82.el8_10.15.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-7008\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-7008\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3821\",\n                \"title\" : \"An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3821\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4415\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4415\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-45873\",\n                \"title\" : \"systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-45873\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4598\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-4598\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-7008\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-7008\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12133\",\n                \"title\" : \"Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-12133\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2236\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-2236\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2236\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-2236\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2007-4559\",\n                \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2007-4559\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2007-4559\",\n                \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2007-4559\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/alsa-lib@1.2.10-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=alsa-lib-1.2.10-2.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2026-25068\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-25068\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2026-25068\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-25068\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2025-15467\",\n              \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 9.8,\n              \"severity\" : \"CRITICAL\",\n              \"cves\" : [ \"CVE-2025-15467\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\",\n            \"issues\" : [ {\n              \"id\" : \"CVE-2021-35938\",\n              \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.5,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2021-35938\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2021-35939\",\n              \"title\" : \"It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.5,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2021-35939\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2021-35937\",\n              \"title\" : \"A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.3,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2021-35937\" ],\n              \"unique\" : false\n            } ],\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1473\",\n                \"title\" : \"Resource leakage when decoding certificates and keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1473\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3358\",\n                \"title\" : \"Using a Custom Cipher with NID_undef may lead to NULL encryption\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3358\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3602\",\n                \"title\" : \"X.509 Email Address 4-byte Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3602\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3786\",\n                \"title\" : \"X.509 Email Address Variable Length Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3786\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4450\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-4450\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0215\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0215\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0216\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0216\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0217\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0401\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0401\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5363\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-5363\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0286\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0286\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12797\",\n                \"title\" : \"RFC7250 handshakes with unauthenticated servers don't abort as expected\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-12797\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69419\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69419\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1292\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1292\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2068\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2068\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2650\",\n                \"title\" : \"Possible DoS translating ASN.1 object identifiers\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2650\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6129\",\n                \"title\" : \"POLY1305 MAC implementation corrupts vector registers on PowerPC\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6129\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69421\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69421\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-11187\",\n                \"title\" : \"Improper validation of PBMAC1 parameters in PKCS#12 MAC verification\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-11187\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-1971\",\n                \"title\" : \"EDIPARTYNAME NULL pointer dereference\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-1971\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4304\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4304\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0464\",\n                \"title\" : \"Excessive Resource Usage Verifying X.509 Policy Constraints\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0464\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6237\",\n                \"title\" : \"Excessive time spent checking invalid RSA public keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6237\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-5535\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-5535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6119\",\n                \"title\" : \"Possible denial of service in X.509 name checks\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-6119\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15468\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15468\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-66199\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-66199\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69420\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69420\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22796\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22796\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4741\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4741\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9230\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9230\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0727\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0727\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15469\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15469\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1343\",\n                \"title\" : \"OCSP_basic_verify may incorrectly verify the response signing certificate\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1343\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2097\",\n                \"title\" : \"AES OCB fails to encrypt some bytes\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2097\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0465\",\n                \"title\" : \"Invalid certificate policies in leaf certificates are silently ignored\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0465\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0466\",\n                \"title\" : \"Certificate policy check not enabled\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0466\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2975\",\n                \"title\" : \"AES-SIV implementation ignores empty associated data entries\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3446\",\n                \"title\" : \"Excessive time spent checking DH keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3446\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3817\",\n                \"title\" : \"Excessive time spent checking DH q parameter value\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3817\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5678\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-5678\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4603\",\n                \"title\" : \"Excessive time spent checking DSA keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1255\",\n                \"title\" : \"Input buffer over-read in AES-XTS implementation on 64 bit ARM\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1255\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4203\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4203\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-68160\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-68160\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69418\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69418\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2511\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-2511\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-32207\",\n                \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2022-32207\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-22576\",\n                \"title\" : \"An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-22576\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38545\",\n                \"title\" : \"This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\\nhandshake.\\n\\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\\nthat to resolve the address instead of it getting done by curl itself, the\\nmaximum length that host name can be is 255 bytes.\\n\\nIf the host name is detected to be longer, curl switches to local name\\nresolving and instead passes on the resolved address only. Due to this bug,\\nthe local variable that means \\\"let the host resolve the name\\\" could get the\\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\\ncopy the too long host name to the target buffer instead of copying just the\\nresolved address there.\\n\\nThe target buffer being a heap based buffer, and the host name coming from the\\nURL that curl has been told to operate with.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-38545\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27775\",\n                \"title\" : \"An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-27775\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27782\",\n                \"title\" : \"libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-27782\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2398\",\n                \"title\" : \"HTTP/2 push headers memory-leak\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2398\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32206\",\n                \"title\" : \"curl \u003c 7.84.0 supports \\\"chained\\\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \\\"malloc bomb\\\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32206\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-23916\",\n                \"title\" : \"An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \\\"chained\\\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \\\"malloc bomb\\\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-23916\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-43552\",\n                \"title\" : \"A use after free vulnerability exists in curl \u003c7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-43552\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27535\",\n                \"title\" : \"An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27536\",\n                \"title\" : \"An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27536\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28321\",\n                \"title\" : \"An improper certificate validation vulnerability exists in curl \u003cv8.1.0 in the way it supports matching of wildcard patterns when listed as \\\"Subject Alternative Name\\\" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-28321\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27538\",\n                \"title\" : \"An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27538\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32208\",\n                \"title\" : \"When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32208\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-46218\",\n                \"title\" : \"This flaw allows a malicious HTTP server to set \\\"super cookies\\\" in curl that\\nare then passed back to more origins than what is otherwise allowed or\\npossible. This allows a site to set cookies that then would get sent to\\ndifferent and unrelated sites and domains.\\n\\nIt could do this by exploiting a mixed case flaw in curl's function that\\nverifies a given cookie domain against the Public Suffix List (PSL). For\\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-46218\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9086\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9086\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27774\",\n                \"title\" : \"An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-27774\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32221\",\n                \"title\" : \"When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32221\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27776\",\n                \"title\" : \"A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-27776\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27533\",\n                \"title\" : \"A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \\\"telnet options\\\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27533\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27534\",\n                \"title\" : \"A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-27534\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28322\",\n                \"title\" : \"An information disclosure vulnerability exists in curl \u003cv8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-28322\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38546\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-38546\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-35252\",\n                \"title\" : \"When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\\\"sister site\\\" to deny service to all siblings.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.1,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2022-35252\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-32207\",\n                \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2022-32207\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-32207\",\n                \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2022-32207\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-22576\",\n                \"title\" : \"An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-22576\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38545\",\n                \"title\" : \"This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\\nhandshake.\\n\\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\\nthat to resolve the address instead of it getting done by curl itself, the\\nmaximum length that host name can be is 255 bytes.\\n\\nIf the host name is detected to be longer, curl switches to local name\\nresolving and instead passes on the resolved address only. Due to this bug,\\nthe local variable that means \\\"let the host resolve the name\\\" could get the\\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\\ncopy the too long host name to the target buffer instead of copying just the\\nresolved address there.\\n\\nThe target buffer being a heap based buffer, and the host name coming from the\\nURL that curl has been told to operate with.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-38545\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15079\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-15079\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27775\",\n                \"title\" : \"An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-27775\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27782\",\n                \"title\" : \"libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-27782\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2398\",\n                \"title\" : \"HTTP/2 push headers memory-leak\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2398\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-13034\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-13034\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14819\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14819\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-1965\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-1965\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32206\",\n                \"title\" : \"curl \u003c 7.84.0 supports \\\"chained\\\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \\\"malloc bomb\\\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32206\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-23916\",\n                \"title\" : \"An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \\\"chained\\\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \\\"malloc bomb\\\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-23916\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14524\",\n                \"title\" : \"bearer token leak on cross-protocol redirect\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14524\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-3784\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-3784\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-3805\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-3805\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-43552\",\n                \"title\" : \"A use after free vulnerability exists in curl \u003c7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-43552\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27535\",\n                \"title\" : \"An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27536\",\n                \"title\" : \"An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27536\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28321\",\n                \"title\" : \"An improper certificate validation vulnerability exists in curl \u003cv8.1.0 in the way it supports matching of wildcard patterns when listed as \\\"Subject Alternative Name\\\" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-28321\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-10966\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-10966\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-3783\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-3783\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27538\",\n                \"title\" : \"An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27538\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32208\",\n                \"title\" : \"When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32208\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-46218\",\n                \"title\" : \"This flaw allows a malicious HTTP server to set \\\"super cookies\\\" in curl that\\nare then passed back to more origins than what is otherwise allowed or\\npossible. This allows a site to set cookies that then would get sent to\\ndifferent and unrelated sites and domains.\\n\\nIt could do this by exploiting a mixed case flaw in curl's function that\\nverifies a given cookie domain against the Public Suffix List (PSL). For\\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-46218\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9086\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9086\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27774\",\n                \"title\" : \"An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-27774\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32221\",\n                \"title\" : \"When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32221\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-10148\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-10148\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14017\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14017\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15224\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15224\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27776\",\n                \"title\" : \"A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-27776\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27533\",\n                \"title\" : \"A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \\\"telnet options\\\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27533\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27534\",\n                \"title\" : \"A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-27534\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28322\",\n                \"title\" : \"An information disclosure vulnerability exists in curl \u003cv8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-28322\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38546\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-38546\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-35252\",\n                \"title\" : \"When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\\\"sister site\\\" to deny service to all siblings.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.1,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2022-35252\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-32207\",\n                \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2022-32207\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-40896\",\n                \"title\" : \"In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \\\"checked\\\"). This makes classic XXE attacks possible.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.1,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-40896\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-49794\",\n                \"title\" : \"Libxml: heap use after free (uaf) leads to denial of service (dos)\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.1,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-49794\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-49796\",\n                \"title\" : \"Libxml: type confusion leads to denial of service (dos)\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.1,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-49796\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-56171\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-56171\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-40304\",\n                \"title\" : \"An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-40304\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-24928\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-24928\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-7425\",\n                \"title\" : \"Libxslt: heap use-after-free in libxslt caused by atype corruption in xmlattrptr\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-7425\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-40303\",\n                \"title\" : \"An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-40303\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-25062\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-25062\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32415\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-32415\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-49795\",\n                \"title\" : \"Libxml: null pointer dereference leads to denial of service (dos)\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-49795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6021\",\n                \"title\" : \"Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6021\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-7424\",\n                \"title\" : \"Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-7424\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29824\",\n                \"title\" : \"In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-29824\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-39615\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-39615\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9714\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9714\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-49043\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-49043\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28484\",\n                \"title\" : \"In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-28484\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-29469\",\n                \"title\" : \"An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the '\\\\0' value).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-29469\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32414\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-32414\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6170\",\n                \"title\" : \"Libxml2: stack buffer overflow in xmllint interactive shell command handling\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 2.5,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2025-6170\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-40896\",\n                \"title\" : \"In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \\\"checked\\\"). This makes classic XXE attacks possible.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.1,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-40896\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42898\",\n                \"title\" : \"PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \\\"a similar bug.\\\"\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-42898\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-39975\",\n                \"title\" : \"kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-39975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26462\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-26462\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37370\",\n                \"title\" : \"In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-37370\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-17049\",\n                \"title\" : \"Kerberos KDC Security Feature Bypass Vulnerability\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2020-17049\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-36054\",\n                \"title\" : \"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-36054\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37371\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-37371\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-24528\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-24528\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26458\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26458\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26461\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26461\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3576\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-3576\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1271\",\n                \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1271\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-31115\",\n                \"title\" : \"XZ has a heap-use-after-free bug in threaded .xz decoder\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-31115\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1271\",\n                \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1271\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-37434\",\n                \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-37434\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-5318\",\n                \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5318\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5987\",\n                \"title\" : \"Libssh: invalid return code for chacha20 poly1305 with openssl backend\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5987\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-48795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-48795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2283\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2283\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6004\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6004\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1667\",\n                \"title\" : \"A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1667\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6918\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-6918\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-5318\",\n                \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5318\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-5318\",\n                \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5318\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5987\",\n                \"title\" : \"Libssh: invalid return code for chacha20 poly1305 with openssl backend\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5987\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-48795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-48795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2283\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2283\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6004\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6004\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1667\",\n                \"title\" : \"A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1667\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6918\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-6918\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-5318\",\n                \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5318\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-5914\",\n                \"title\" : \"Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5914\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-4111\",\n                \"title\" : \"Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-4111\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-4424\",\n                \"title\" : \"Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-4424\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-5121\",\n                \"title\" : \"Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-5121\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-26280\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-26280\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-36227\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-36227\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-57970\",\n                \"title\" : \"libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-57970\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-25724\",\n                \"title\" : \"list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-25724\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-5914\",\n                \"title\" : \"Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5914\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2602\",\n                \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.3,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-2602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-6965\",\n                \"title\" : \"Integer Truncation on SQLite\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6965\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-7104\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-7104\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3277\",\n                \"title\" : \"An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-3277\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-35737\",\n                \"title\" : \"SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-35737\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-6965\",\n                \"title\" : \"Integer Truncation on SQLite\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6965\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-44487\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-44487\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-27135\",\n                \"title\" : \"nghttp2 Denial of service: Assertion failure due to the missing state validation\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-27135\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28182\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-28182\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-44487\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-44487\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-6176\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6176\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-6176\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6176\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-2953\",\n                \"title\" : \"A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2953\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-2953\",\n                \"title\" : \"A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2953\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-44964\",\n                \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-44964\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-33099\",\n                \"title\" : \"An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-33099\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-28805\",\n                \"title\" : \"singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-28805\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-43519\",\n                \"title\" : \"Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43519\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-44964\",\n                \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-44964\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-35938\",\n                \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35938\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-35939\",\n                \"title\" : \"It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35939\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-35937\",\n                \"title\" : \"A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35937\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-35938\",\n                \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35938\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-35938\",\n                \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35938\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-35939\",\n                \"title\" : \"It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35939\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-35937\",\n                \"title\" : \"A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35937\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-35938\",\n                \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35938\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12133\",\n                \"title\" : \"Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-12133\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2025-15467\",\n              \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 9.8,\n              \"severity\" : \"CRITICAL\",\n              \"cves\" : [ \"CVE-2025-15467\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=microdnf-3.8.0-2.el8.src.rpm\",\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1473\",\n                \"title\" : \"Resource leakage when decoding certificates and keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1473\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3358\",\n                \"title\" : \"Using a Custom Cipher with NID_undef may lead to NULL encryption\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3358\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3602\",\n                \"title\" : \"X.509 Email Address 4-byte Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3602\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3786\",\n                \"title\" : \"X.509 Email Address Variable Length Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3786\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4450\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-4450\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0215\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0215\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0216\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0216\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0217\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0401\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0401\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5363\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-5363\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0286\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0286\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12797\",\n                \"title\" : \"RFC7250 handshakes with unauthenticated servers don't abort as expected\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-12797\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69419\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69419\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1292\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1292\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2068\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2068\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2650\",\n                \"title\" : \"Possible DoS translating ASN.1 object identifiers\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2650\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6129\",\n                \"title\" : \"POLY1305 MAC implementation corrupts vector registers on PowerPC\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6129\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69421\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69421\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-11187\",\n                \"title\" : \"Improper validation of PBMAC1 parameters in PKCS#12 MAC verification\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-11187\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-1971\",\n                \"title\" : \"EDIPARTYNAME NULL pointer dereference\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-1971\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4304\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4304\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0464\",\n                \"title\" : \"Excessive Resource Usage Verifying X.509 Policy Constraints\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0464\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6237\",\n                \"title\" : \"Excessive time spent checking invalid RSA public keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6237\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-5535\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-5535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6119\",\n                \"title\" : \"Possible denial of service in X.509 name checks\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-6119\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15468\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15468\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-66199\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-66199\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69420\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69420\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22796\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22796\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4741\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4741\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9230\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9230\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0727\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0727\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15469\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15469\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1343\",\n                \"title\" : \"OCSP_basic_verify may incorrectly verify the response signing certificate\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1343\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2097\",\n                \"title\" : \"AES OCB fails to encrypt some bytes\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2097\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0465\",\n                \"title\" : \"Invalid certificate policies in leaf certificates are silently ignored\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0465\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0466\",\n                \"title\" : \"Certificate policy check not enabled\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0466\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2975\",\n                \"title\" : \"AES-SIV implementation ignores empty associated data entries\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3446\",\n                \"title\" : \"Excessive time spent checking DH keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3446\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3817\",\n                \"title\" : \"Excessive time spent checking DH q parameter value\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3817\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5678\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-5678\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4603\",\n                \"title\" : \"Excessive time spent checking DSA keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1255\",\n                \"title\" : \"Input buffer over-read in AES-XTS implementation on 64 bit ARM\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1255\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4203\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4203\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-68160\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-68160\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69418\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69418\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2511\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-2511\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-32207\",\n                \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2022-32207\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-22576\",\n                \"title\" : \"An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-22576\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38545\",\n                \"title\" : \"This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\\nhandshake.\\n\\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\\nthat to resolve the address instead of it getting done by curl itself, the\\nmaximum length that host name can be is 255 bytes.\\n\\nIf the host name is detected to be longer, curl switches to local name\\nresolving and instead passes on the resolved address only. Due to this bug,\\nthe local variable that means \\\"let the host resolve the name\\\" could get the\\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\\ncopy the too long host name to the target buffer instead of copying just the\\nresolved address there.\\n\\nThe target buffer being a heap based buffer, and the host name coming from the\\nURL that curl has been told to operate with.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-38545\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27775\",\n                \"title\" : \"An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-27775\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27782\",\n                \"title\" : \"libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-27782\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2398\",\n                \"title\" : \"HTTP/2 push headers memory-leak\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2398\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32206\",\n                \"title\" : \"curl \u003c 7.84.0 supports \\\"chained\\\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \\\"malloc bomb\\\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32206\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-23916\",\n                \"title\" : \"An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \\\"chained\\\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \\\"malloc bomb\\\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-23916\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-43552\",\n                \"title\" : \"A use after free vulnerability exists in curl \u003c7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-43552\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27535\",\n                \"title\" : \"An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27536\",\n                \"title\" : \"An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27536\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28321\",\n                \"title\" : \"An improper certificate validation vulnerability exists in curl \u003cv8.1.0 in the way it supports matching of wildcard patterns when listed as \\\"Subject Alternative Name\\\" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-28321\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27538\",\n                \"title\" : \"An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27538\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32208\",\n                \"title\" : \"When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32208\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-46218\",\n                \"title\" : \"This flaw allows a malicious HTTP server to set \\\"super cookies\\\" in curl that\\nare then passed back to more origins than what is otherwise allowed or\\npossible. This allows a site to set cookies that then would get sent to\\ndifferent and unrelated sites and domains.\\n\\nIt could do this by exploiting a mixed case flaw in curl's function that\\nverifies a given cookie domain against the Public Suffix List (PSL). For\\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-46218\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9086\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9086\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27774\",\n                \"title\" : \"An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-27774\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32221\",\n                \"title\" : \"When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32221\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27776\",\n                \"title\" : \"A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-27776\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27533\",\n                \"title\" : \"A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \\\"telnet options\\\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27533\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27534\",\n                \"title\" : \"A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-27534\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28322\",\n                \"title\" : \"An information disclosure vulnerability exists in curl \u003cv8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-28322\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38546\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-38546\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-35252\",\n                \"title\" : \"When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\\\"sister site\\\" to deny service to all siblings.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.1,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2022-35252\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-32207\",\n                \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2022-32207\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-32207\",\n                \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2022-32207\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-22576\",\n                \"title\" : \"An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-22576\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38545\",\n                \"title\" : \"This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\\nhandshake.\\n\\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\\nthat to resolve the address instead of it getting done by curl itself, the\\nmaximum length that host name can be is 255 bytes.\\n\\nIf the host name is detected to be longer, curl switches to local name\\nresolving and instead passes on the resolved address only. Due to this bug,\\nthe local variable that means \\\"let the host resolve the name\\\" could get the\\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\\ncopy the too long host name to the target buffer instead of copying just the\\nresolved address there.\\n\\nThe target buffer being a heap based buffer, and the host name coming from the\\nURL that curl has been told to operate with.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-38545\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15079\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-15079\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27775\",\n                \"title\" : \"An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-27775\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27782\",\n                \"title\" : \"libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-27782\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2398\",\n                \"title\" : \"HTTP/2 push headers memory-leak\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2398\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-13034\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-13034\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14819\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14819\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-1965\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-1965\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32206\",\n                \"title\" : \"curl \u003c 7.84.0 supports \\\"chained\\\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \\\"malloc bomb\\\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32206\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-23916\",\n                \"title\" : \"An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \\\"chained\\\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \\\"malloc bomb\\\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-23916\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14524\",\n                \"title\" : \"bearer token leak on cross-protocol redirect\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14524\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-3784\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-3784\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-3805\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-3805\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-43552\",\n                \"title\" : \"A use after free vulnerability exists in curl \u003c7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-43552\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27535\",\n                \"title\" : \"An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27536\",\n                \"title\" : \"An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27536\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28321\",\n                \"title\" : \"An improper certificate validation vulnerability exists in curl \u003cv8.1.0 in the way it supports matching of wildcard patterns when listed as \\\"Subject Alternative Name\\\" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-28321\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-10966\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-10966\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-3783\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-3783\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27538\",\n                \"title\" : \"An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27538\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32208\",\n                \"title\" : \"When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32208\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-46218\",\n                \"title\" : \"This flaw allows a malicious HTTP server to set \\\"super cookies\\\" in curl that\\nare then passed back to more origins than what is otherwise allowed or\\npossible. This allows a site to set cookies that then would get sent to\\ndifferent and unrelated sites and domains.\\n\\nIt could do this by exploiting a mixed case flaw in curl's function that\\nverifies a given cookie domain against the Public Suffix List (PSL). For\\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-46218\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9086\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9086\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27774\",\n                \"title\" : \"An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-27774\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32221\",\n                \"title\" : \"When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32221\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-10148\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-10148\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14017\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14017\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15224\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15224\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27776\",\n                \"title\" : \"A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-27776\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27533\",\n                \"title\" : \"A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \\\"telnet options\\\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27533\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27534\",\n                \"title\" : \"A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-27534\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28322\",\n                \"title\" : \"An information disclosure vulnerability exists in curl \u003cv8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-28322\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38546\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-38546\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-35252\",\n                \"title\" : \"When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\\\"sister site\\\" to deny service to all siblings.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.1,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2022-35252\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-32207\",\n                \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2022-32207\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-40896\",\n                \"title\" : \"In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \\\"checked\\\"). This makes classic XXE attacks possible.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.1,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-40896\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-49794\",\n                \"title\" : \"Libxml: heap use after free (uaf) leads to denial of service (dos)\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.1,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-49794\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-49796\",\n                \"title\" : \"Libxml: type confusion leads to denial of service (dos)\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.1,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-49796\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-56171\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-56171\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-40304\",\n                \"title\" : \"An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-40304\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-24928\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-24928\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-7425\",\n                \"title\" : \"Libxslt: heap use-after-free in libxslt caused by atype corruption in xmlattrptr\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-7425\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-40303\",\n                \"title\" : \"An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-40303\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-25062\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-25062\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32415\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-32415\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-49795\",\n                \"title\" : \"Libxml: null pointer dereference leads to denial of service (dos)\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-49795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6021\",\n                \"title\" : \"Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6021\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-7424\",\n                \"title\" : \"Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-7424\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29824\",\n                \"title\" : \"In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-29824\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-39615\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-39615\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9714\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9714\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-49043\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-49043\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28484\",\n                \"title\" : \"In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-28484\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-29469\",\n                \"title\" : \"An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the '\\\\0' value).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-29469\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32414\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-32414\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6170\",\n                \"title\" : \"Libxml2: stack buffer overflow in xmllint interactive shell command handling\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 2.5,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2025-6170\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-40896\",\n                \"title\" : \"In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \\\"checked\\\"). This makes classic XXE attacks possible.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.1,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-40896\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42898\",\n                \"title\" : \"PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \\\"a similar bug.\\\"\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-42898\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-39975\",\n                \"title\" : \"kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-39975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26462\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-26462\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37370\",\n                \"title\" : \"In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-37370\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-17049\",\n                \"title\" : \"Kerberos KDC Security Feature Bypass Vulnerability\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2020-17049\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-36054\",\n                \"title\" : \"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-36054\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37371\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-37371\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-24528\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-24528\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26458\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26458\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26461\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26461\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3576\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-3576\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1271\",\n                \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1271\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-31115\",\n                \"title\" : \"XZ has a heap-use-after-free bug in threaded .xz decoder\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-31115\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1271\",\n                \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1271\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libksba@1.3.5-9.el8_7?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libksba-1.3.5-9.el8_7.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3515\",\n                \"title\" : \"A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3515\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-47629\",\n                \"title\" : \"Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-47629\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3515\",\n                \"title\" : \"A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3515\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2026-24882\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-24882\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-68973\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-68973\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-34903\",\n                \"title\" : \"GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-34903\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2026-24882\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-24882\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-37434\",\n                \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-37434\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-5318\",\n                \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5318\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5987\",\n                \"title\" : \"Libssh: invalid return code for chacha20 poly1305 with openssl backend\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5987\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-48795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-48795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2283\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2283\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6004\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6004\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1667\",\n                \"title\" : \"A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1667\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6918\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-6918\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-5318\",\n                \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5318\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-5318\",\n                \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5318\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5987\",\n                \"title\" : \"Libssh: invalid return code for chacha20 poly1305 with openssl backend\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5987\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-48795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-48795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2283\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2283\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6004\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6004\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1667\",\n                \"title\" : \"A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1667\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6918\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-6918\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-5318\",\n                \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5318\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2602\",\n                \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.3,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-2602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-5914\",\n                \"title\" : \"Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5914\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-4111\",\n                \"title\" : \"Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-4111\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-4424\",\n                \"title\" : \"Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-4424\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-5121\",\n                \"title\" : \"Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-5121\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-26280\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-26280\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-36227\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-36227\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-57970\",\n                \"title\" : \"libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-57970\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-25724\",\n                \"title\" : \"list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-25724\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-5914\",\n                \"title\" : \"Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5914\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-13601\",\n                \"title\" : \"Glib: integer overflow in in g_escape_uri_string()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-13601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-52533\",\n                \"title\" : \"gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\\\\0' character.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-52533\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-32611\",\n                \"title\" : \"G_variant_byteswap() can take a long time with some non-normal inputs\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-32611\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-32665\",\n                \"title\" : \"Gvariant deserialisation does not match spec for non-normal data\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-32665\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14512\",\n                \"title\" : \"Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14512\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-29499\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-29499\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14087\",\n                \"title\" : \"Glib: glib: buffer underflow in gvariant parser leads to heap corruption\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14087\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4373\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-4373\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-34397\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.8,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-34397\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-13601\",\n                \"title\" : \"Glib: integer overflow in in g_escape_uri_string()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-13601\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-6965\",\n                \"title\" : \"Integer Truncation on SQLite\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6965\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-7104\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-7104\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3277\",\n                \"title\" : \"An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-3277\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-35737\",\n                \"title\" : \"SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-35737\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-6965\",\n                \"title\" : \"Integer Truncation on SQLite\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6965\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-33928\",\n                \"title\" : \"Buffer overflow vulnerability in function pool_installable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-33928\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-33929\",\n                \"title\" : \"Buffer overflow vulnerability in function pool_disabled_solvable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-33929\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-33930\",\n                \"title\" : \"Buffer overflow vulnerability in function pool_installable_whatprovides in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-33930\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-33938\",\n                \"title\" : \"Buffer overflow vulnerability in function prune_to_recommended in src/policy.c in libsolv before 0.7.17 allows attackers to cause a Denial of Service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-33938\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-46877\",\n                \"title\" : \"jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-46877\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28863\",\n                \"title\" : \"node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-28863\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-44568\",\n                \"title\" : \"Two heap-overflow vulnerabilities exist in openSUSE/libsolv libsolv through 13 Dec 2020 in the decisionmap variable via the resolve_dependencies function at src/solver.c (line 1940 \u0026 line 1995), which could cause a remote Denial of Service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-44568\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-3200\",\n                \"title\" : \"Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.3,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2021-3200\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-33928\",\n                \"title\" : \"Buffer overflow vulnerability in function pool_installable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-33928\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-6176\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6176\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-6176\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6176\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-2509\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-2509\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0553\",\n                \"title\" : \"Gnutls: incomplete fix for cve-2023-5981\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-0553\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0567\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-0567\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0361\",\n                \"title\" : \"A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0361\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32988\",\n                \"title\" : \"Gnutls: vulnerability in gnutls othername san export\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-32988\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32990\",\n                \"title\" : \"Gnutls: vulnerability in gnutls certtool template parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-32990\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6395\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-6395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5981\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-5981\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12243\",\n                \"title\" : \"Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-12243\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28834\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-28834\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14831\",\n                \"title\" : \"Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14831\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32989\",\n                \"title\" : \"Gnutls: vulnerability in gnutls sct extension parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-32989\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28835\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-28835\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9820\",\n                \"title\" : \"Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9820\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-2509\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-2509\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-44487\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-44487\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-27135\",\n                \"title\" : \"nghttp2 Denial of service: Assertion failure due to the missing state validation\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-27135\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28182\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-28182\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-44487\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-44487\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-2953\",\n                \"title\" : \"A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2953\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-2953\",\n                \"title\" : \"A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2953\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-44964\",\n                \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-44964\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-33099\",\n                \"title\" : \"An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-33099\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-28805\",\n                \"title\" : \"singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-28805\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-43519\",\n                \"title\" : \"Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43519\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-44964\",\n                \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-44964\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-35938\",\n                \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35938\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-35939\",\n                \"title\" : \"It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35939\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-35937\",\n                \"title\" : \"A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35937\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-35938\",\n                \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35938\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-35938\",\n                \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35938\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-35939\",\n                \"title\" : \"It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35939\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-35937\",\n                \"title\" : \"A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35937\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-35938\",\n                \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35938\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-27456\",\n                \"title\" : \"util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-27456\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12133\",\n                \"title\" : \"Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-12133\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2236\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-2236\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2236\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-2236\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=systemd-239-82.el8_10.15.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-7008\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-7008\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3821\",\n                \"title\" : \"An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3821\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4415\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4415\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-45873\",\n                \"title\" : \"systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-45873\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4598\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-4598\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-7008\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-7008\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/file-libs@5.33-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=file-5.33-27.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-48554\",\n                \"title\" : \"File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \\\"File\\\" is the name of an Open Source project.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-48554\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-48554\",\n                \"title\" : \"File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \\\"File\\\" is the name of an Open Source project.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-48554\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2025-15467\",\n              \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 9.8,\n              \"severity\" : \"CRITICAL\",\n              \"cves\" : [ \"CVE-2025-15467\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm\",\n            \"issues\" : [ {\n              \"id\" : \"CVE-2025-45582\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 5.6,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2025-45582\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2022-48303\",\n              \"title\" : \"GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 5.5,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2022-48303\" ],\n              \"unique\" : false\n            } ],\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-37434\",\n                \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-37434\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2024-2961\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 8.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-2961\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm\",\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2024-2961\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 8.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-2961\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm\",\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2024-2961\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 8.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-2961\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm\",\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"uniqu\r100 1002k    0  641k  100  360k   112k  64703  0:00:05  0:00:05 --:--:--  183k\ne\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2024-2961\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 8.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-2961\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm\",\n            \"issues\" : [ {\n              \"id\" : \"CVE-2023-4641\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 4.7,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2023-4641\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-56433\",\n              \"title\" : \"shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 3.6,\n              \"severity\" : \"LOW\",\n              \"cves\" : [ \"CVE-2024-56433\" ],\n              \"unique\" : false\n            } ],\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2602\",\n                \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.3,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-2602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2024-2961\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 8.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-2961\" ],\n              \"unique\" : false\n            }\n          } ]\n        }\n      }\n    }\n  },\n  \"licenses\" : [ {\n    \"status\" : {\n      \"ok\" : false,\n      \"name\" : \"deps.dev\",\n      \"code\" : 400,\n      \"message\" : \"Bad Request: invalid purl \\\"pkg:maven/io.github.stuartwdouglas.hacbstest.Main/hacbs-test\\\" at request index 25\",\n      \"warnings\" : { }\n    },\n    \"summary\" : {\n      \"total\" : 1,\n      \"concluded\" : 119,\n      \"permissive\" : 1,\n      \"weakCopyleft\" : 0,\n      \"strongCopyleft\" : 0,\n      \"unknown\" : 0,\n      \"deprecated\" : 0,\n      \"osiApproved\" : 1,\n      \"fsfLibre\" : 1\n    },\n    \"packages\" : {\n      \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/p11-kit@0.23.22-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=p11-kit-0.23.22-2.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libxcrypt@4.1.1-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxcrypt-4.1.1-6.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/sed@4.5-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sed-4.5-5.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/filesystem@3.8-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=filesystem-3.8-6.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nettle-3.4.1-7.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libverto@0.3.2-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libverto-0.3.2-2.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gpg-pubkey@fd431d51-4ae0493b?distro=rhel-8.10\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gdbm-libs@1.18-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gdbm-1.18-2.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libunistring@0.9.9-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libunistring-0.9.9-3.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/platform-python@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/json-c@0.13.1-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=json-c-0.13.1-3.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libyaml@0.1.7-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libyaml-0.1.7-5.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libksba@1.3.5-9.el8_7?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libksba-1.3.5-9.el8_7.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/file-libs@5.33-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=file-5.33-27.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libacl@2.2.53-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=acl-2.2.53-3.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/p11-kit-trust@0.23.22-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=p11-kit-0.23.22-2.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libzstd@1.4.4-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zstd-1.4.4-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/langpacks-en@1.0-12.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=langpacks-1.0-12.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/keyutils-libs@1.5.10-9.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=keyutils-1.5.10-9.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:github/beatlabs/delete-old-branches-action@v0.0.10\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/findutils@4.6.0-24.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=findutils-4.6.0-24.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libattr@2.4.48-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=attr-2.4.48-3.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/npth@1.5-4.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=npth-1.5-4.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/librepo@1.14.2-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=librepo-1.14.2-5.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/dbus-libs@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/chkconfig@1.19.2-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=chkconfig-1.19.2-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/platform-python-setuptools@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/librhsm@0.0.3-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=librhsm-0.0.3-5.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/publicsuffix-list-dafsa@20180723-1.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=publicsuffix-list-20180723-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gpg-pubkey@d4082792-5b32db75?distro=rhel-8.10\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/readline@7.0-10.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=readline-7.0-10.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libdnf@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libusbx-1.0.23-4.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libsigsegv@2.11-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsigsegv-2.11-5.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/ca-certificates@2025.2.80_v9.0.304-80.2.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ca-certificates-2025.2.80_v9.0.304-80.2.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gawk@4.2.1-4.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gawk-4.2.1-4.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libnsl2@1.2.0-2.20180605git4a062cf.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libnsl2-1.2.0-2.20180605git4a062cf.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/basesystem@11-5.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=basesystem-11-5.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/popt@1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=popt-1.18-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libidn2@2.2.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libidn2-2.2.0-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/setup@2.12.2-9.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=setup-2.12.2-9.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/tzdata@2026a-1.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=tzdata-2026a-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=systemd-239-82.el8_10.15.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/grep@3.1-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=grep-3.1-6.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/mpfr@3.1.6-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=mpfr-3.1.6-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/redhat-release@8.10-0.3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=redhat-release-8.10-0.3.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libassuan@2.5.1-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libassuan-2.5.1-3.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/elfutils-libelf@0.190-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=elfutils-0.190-2.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/json-glib@1.4.4-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=json-glib-1.4.4-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gobject-introspection@1.56.1-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gobject-introspection-1.56.1-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libselinux@2.9-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libselinux-2.9-11.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libsepol@2.9-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsepol-2.9-3.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:github/actions/checkout@v4\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libgpg-error@1.31-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgpg-error-1.31-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/info@6.5-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=texinfo-6.5-7.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libdb-utils@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libpsl@0.20.2-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpsl-0.20.2-6.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/coreutils-single@8.30-17.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=coreutils-8.30-17.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libcap-ng@0.7.11-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-ng-0.7.11-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-6.el8_5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cyrus-sasl-2.1.27-6.el8_5.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/crypto-policies@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libffi@3.1-24.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libffi-3.1-24.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/pcre@8.42-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre-8.42-6.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gdbm@1.18-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gdbm-1.18-2.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/audit-libs@3.1.2-1.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=audit-3.1.2-1.el8_10.1.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:pypi/setuptools@39.2.0\" : {\n        \"concluded\" : {\n          \"identifiers\" : [ {\n            \"id\" : \"MIT\",\n            \"name\" : \"MIT License\",\n            \"isDeprecated\" : false,\n            \"isOsiApproved\" : true,\n            \"isFsfLibre\" : true,\n            \"category\" : \"PERMISSIVE\"\n          } ],\n          \"expression\" : \"MIT\",\n          \"name\" : \"MIT License\",\n          \"category\" : \"PERMISSIVE\",\n          \"source\" : \"deps.dev\",\n          \"sourceUrl\" : \"https://api.deps.dev\"\n        },\n        \"evidence\" : [ {\n          \"identifiers\" : [ {\n            \"id\" : \"MIT\",\n            \"name\" : \"MIT License\",\n            \"isDeprecated\" : false,\n            \"isOsiApproved\" : true,\n            \"isFsfLibre\" : true,\n            \"category\" : \"PERMISSIVE\"\n          } ],\n          \"expression\" : \"MIT\",\n          \"name\" : \"MIT License\",\n          \"category\" : \"PERMISSIVE\",\n          \"source\" : \"deps.dev\",\n          \"sourceUrl\" : \"https://api.deps.dev\"\n        } ]\n      },\n      \"pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      }\n    }\n  } ]\n}\npod: test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4-tpa-scan-pod | container step-oci-attach-report: \nUsing token for quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf\nAttaching tpa-report-amd64.json to quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf@sha256:b8b4bb880469e09b8a76f2c2cbe79428ac097fb3aa1bb16d3e20683a21ac7401\n[retry] executing: oras attach --no-tty --format go-template=\\{\\{.digest\\}\\} --registry-config /tmp/auth/config.json --artifact-type application/vnd.redhat.tpa-report+json quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf@sha256:b8b4bb880469e09b8a76f2c2cbe79428ac097fb3aa1bb16d3e20683a21ac7401 tpa-report-amd64.json:application/vnd.redhat.tpa-report+json\n\npod: test-comp-pac-forgejo-pbtckf-on-pull-request-w4hx4-tpa-scan-pod | container step-conftest-vulnerabilities: \n[\n\t{\n\t\t\"filename\": \"/tekton/home/tpa-report-amd64.json\",\n\t\t\"namespace\": \"required_checks\",\n\t\t\"successes\": 4,\n\t\t\"warnings\": [\n\t\t\t{\n\t\t\t\t\"msg\": \"Found 6 critical vulnerabilities.\",\n\t\t\t\t\"metadata\": {\n\t\t\t\t\t\"details\": {\n\t\t\t\t\t\t\"description\": \"Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-3596)\",\n\t\t\t\t\t\t\"name\": \"rhtpa_critical_vulnerabilities\",\n\t\t\t\t\t\t\"url\": \"https://access.redhat.com/articles/red_hat_vulnerability_tutorial\"\n\t\t\t\t\t},\n\t\t\t\t\t\"vulnerabilities_number\": 6\n\t\t\t\t}\n\t\t\t},\n\t\t\t{\n\t\t\t\t\"msg\": \"Found 115 high vulnerabilities.\",\n\t\t\t\t\"metadata\": {\n\t\t\t\t\t\"details\": {\n\t\t\t\t\t\t\"description\": \"Source: osv-github. Affected dependencies: pkg:pypi/setuptools@39.2.0 [direct] (CVE-2024-6345, CVE-2022-40897); Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [direct] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm [direct] (CVE-2023-2953), pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm [direct] (CVE-2026-21945, CVE-2025-64720, CVE-2025-65018), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/javapackages-filesystem@5.3.0-1.module%2Bel8%2B2447%2B6f56d9a6?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=javapackages-tools-5.3.0-1.module%2Bel8%2B2447%2B6f56d9a6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-48734, CVE-2019-10086), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/cups-libs@2.2.6-67.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=cups-2.2.6-67.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-58060, CVE-2024-47175, CVE-2023-34241), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-2509, CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/lua@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-44964), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-44964), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2025-15079, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-56171, CVE-2022-40304, CVE-2025-24928, CVE-2025-7425, CVE-2022-40303, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424, CVE-2022-29824), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-44964), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2025-15079, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-56171, CVE-2022-40304, CVE-2025-24928, CVE-2025-7425, CVE-2022-40303, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424, CVE-2022-29824), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/libksba@1.3.5-9.el8_7?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libksba-1.3.5-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-3515, CVE-2022-47629), pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-33928, CVE-2021-33929, CVE-2021-33930, CVE-2021-33938, CVE-2021-46877), pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-2509, CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-44964), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587)\",\n\t\t\t\t\t\t\"name\": \"rhtpa_high_vulnerabilities\",\n\t\t\t\t\t\t\"url\": \"https://access.redhat.com/articles/red_hat_vulnerability_tutorial\"\n\t\t\t\t\t},\n\t\t\t\t\t\"vulnerabilities_number\": 115\n\t\t\t\t}\n\t\t\t},\n\t\t\t{\n\t\t\t\t\"msg\": \"Found 178 medium vulnerabilities.\",\n\t\t\t\t\"metadata\": {\n\t\t\t\t\t\"details\": {\n\t\t\t\t\t\t\"description\": \"Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [direct] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm [direct] (CVE-2026-21933, CVE-2026-21925), pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [direct] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm [direct] (CVE-2025-45582, CVE-2022-48303), pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm [direct] (CVE-2023-4641), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-pip-9.0.3-24.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/cups-libs@2.2.6-67.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=cups-2.2.6-67.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-26691, CVE-2023-32360, CVE-2025-58364, CVE-2023-32324, CVE-2025-58436, CVE-2024-35235), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/lua@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/dbus-libs@1.12.8-27.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-42010, CVE-2022-42011, CVE-2022-42012, CVE-2023-34969), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/avahi-libs@0.7-27.el8_10.1?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=avahi-0.7-27.el8_10.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-3468, CVE-2023-1981, CVE-2023-38469, CVE-2023-38470, CVE-2023-38471, CVE-2023-38472, CVE-2023-38473, CVE-2021-3502, CVE-2024-52615, CVE-2024-52616), pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=systemd-239-82.el8_10.15.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-pip-9.0.3-24.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/alsa-lib@1.2.10-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=alsa-lib-1.2.10-2.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2026-25068), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-13034, CVE-2025-14819, CVE-2026-1965, CVE-2022-32206, CVE-2023-23916, CVE-2025-14524, CVE-2026-3784, CVE-2026-3805, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2025-10966, CVE-2026-3783, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2025-10148, CVE-2025-14017, CVE-2025-15224, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-26280, CVE-2022-36227, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-13034, CVE-2025-14819, CVE-2026-1965, CVE-2022-32206, CVE-2023-23916, CVE-2025-14524, CVE-2026-3784, CVE-2026-3805, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2025-10966, CVE-2026-3783, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2025-10148, CVE-2025-14017, CVE-2025-15224, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-34903), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-26280, CVE-2022-36227, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-28863, CVE-2021-44568), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=systemd-239-82.el8_10.15.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/file-libs@5.33-27.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=file-5.33-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2019-12900)\",\n\t\t\t\t\t\t\"name\": \"rhtpa_medium_vulnerabilities\",\n\t\t\t\t\t\t\"url\": \"https://access.redhat.com/articles/red_hat_vulnerability_tutorial\"\n\t\t\t\t\t},\n\t\t\t\t\t\"vulnerabilities_number\": 178\n\t\t\t\t}\n\t\t\t},\n\t\t\t{\n\t\t\t\t\"msg\": \"Found 14 low vulnerabilities.\",\n\t\t\t\t\"metadata\": {\n\t\t\t\t\t\"details\": {\n\t\t\t\t\t\t\"description\": \"Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [direct] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm [direct] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-6170), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-6170), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-34397), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-3200), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-2602)\",\n\t\t\t\t\t\t\"name\": \"rhtpa_low_vulnerabilities\",\n\t\t\t\t\t\t\"url\": \"https://access.redhat.com/articles/red_hat_vulnerability_tutorial\"\n\t\t\t\t\t},\n\t\t\t\t\t\"vulnerabilities_number\": 14\n\t\t\t\t}\n\t\t\t}\n\t\t]\n\t}\n]\n{\"vulnerabilities\":{\"critical\":6,\"high\":115,\"medium\":178,\"low\":14,\"unknown\":0},\"unpatched_vulnerabilities\":{\"critical\":0,\"high\":0,\"medium\":0,\"low\":0,\"unknown\":0}}\n{\"image\": {\"pullspec\": \"quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf:on-pr-e355f159ef69ef41c997862718838f325ddc8a47\", \"digests\": [\"sha256:b8b4bb880469e09b8a76f2c2cbe79428ac097fb3aa1bb16d3e20683a21ac7401\"]}}\n{\"result\":\"SUCCESS\",\"timestamp\":\"2026-04-20T17:39:32+00:00\",\"note\":\"Task tpa-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by TPA.\",\"namespace\":\"default\",\"successes\":0,\"failures\":0,\"warnings\":0}\nNew PipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-djm7b found after retrigger for component forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc found for Component forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: ResolvingTaskRef\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: Running\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: PipelineRunStopping\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: PipelineRunStopping\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: PipelineRunStopping\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: PipelineRunStopping\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: PipelineRunStopping\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: PipelineRunStopping\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: PipelineRunStopping\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: PipelineRunStopping\nPipelineRun test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc reason: Failed\nattempt 3/3: PipelineRun \"test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc\" failed: \n pod: test-comp-pac-forgejo-pbtckf-on-pull-request-djm7b-init-pod | init container: prepare\n2026/04/20 17:31:03 Entrypoint initialization\n\npod: test-comp-pac-forgejo-pbtckf-on-pull-request-djm7b-init-pod | container step-init: \ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"Using in-cluster config\" logger=KubeClient\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] enable: false\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] default-http-proxy: squid.caching.svc.cluster.local:3128\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] http-proxy-result-path: /tekton/results/http-proxy\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[param] no-proxy-result-path: /tekton/results/no-proxy\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"Cache proxy is disabled in param or in backend\"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[result] HTTP PROXY: \"\ntime=\"2026-04-20T17:31:07Z\" level=info msg=\"[result] NO PROXY: \"\n\n pod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-init-pod | init container: prepare\n2026/04/20 17:42:00 Entrypoint initialization\n\npod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-init-pod | container step-init: \ntime=\"2026-04-20T17:42:03Z\" level=info msg=\"Using in-cluster config\" logger=KubeClient\ntime=\"2026-04-20T17:42:03Z\" level=info msg=\"[param] enable: false\"\ntime=\"2026-04-20T17:42:03Z\" level=info msg=\"[param] default-http-proxy: squid.caching.svc.cluster.local:3128\"\ntime=\"2026-04-20T17:42:03Z\" level=info msg=\"[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\"\ntime=\"2026-04-20T17:42:03Z\" level=info msg=\"[param] http-proxy-result-path: /tekton/results/http-proxy\"\ntime=\"2026-04-20T17:42:03Z\" level=info msg=\"[param] no-proxy-result-path: /tekton/results/no-proxy\"\ntime=\"2026-04-20T17:42:03Z\" level=info msg=\"Cache proxy is disabled in param or in backend\"\ntime=\"2026-04-20T17:42:03Z\" level=info msg=\"[result] HTTP PROXY: \"\ntime=\"2026-04-20T17:42:03Z\" level=info msg=\"[result] NO PROXY: \"\n\n pod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-tpa-scan-pod | init container: prepare\n2026/04/20 17:46:26 Entrypoint initialization\n\n pod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-tpa-scan-pod | init container: place-scripts\n2026/04/20 17:46:27 Decoded script /tekton/scripts/script-0-pkk24\n2026/04/20 17:46:27 Decoded script /tekton/scripts/script-1-666sl\n2026/04/20 17:46:27 Decoded script /tekton/scripts/script-2-nbnf2\n\npod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-tpa-scan-pod | container step-get-vulnerabilities: \nInspecting raw image manifest quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf@sha256:ea8744c45dad74236e8bdd06f4f40711dd4ec5771ad5abcd3cd05e6fa0332408.\nSelecting auth\nUsing token for quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf\nSelecting auth\nUsing token for quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf\nWARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.\nWARNING: Downloading SBOMs this way does not ensure its authenticity. If you want to ensure a tamper-proof SBOM, download it using 'cosign download attestation \u003cimage uri\u003e'.\nFound SBOM of media type: text/spdx+json\nRunning TPA scan on amd64 image manifest...\n  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current\n                                 Dload  Upload   Total   Spent    Left  Speed\n\r  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0\r100  360k    0     0  100  360k      0  1611k --:--:-- --:--:-- --:--:-- 1604k{\n  \"scanned\" : {\n    \"total\" : 152,\n    \"direct\" : 25,\n    \"transitive\" : 127\n  },\n  \"providers\" : {\n    \"rhtpa\" : {\n      \"status\" : {\n        \"ok\" : true,\n        \"name\" : \"rhtpa\",\n        \"code\" : 200,\n        \"message\" : \"OK\",\n        \"warnings\" : {\n          \"pkg:maven/io.github.stuartwdouglas.hacbstest.Main/hacbs-test\" : [ \"Unable to process: missing version component\" ]\n        }\n      },\n      \"sources\" : {\n        \"osv-github\" : {\n          \"summary\" : {\n            \"direct\" : 2,\n            \"transitive\" : 0,\n            \"total\" : 2,\n            \"dependencies\" : 1,\n            \"critical\" : 0,\n            \"high\" : 2,\n            \"medium\" : 0,\n            \"low\" : 0,\n            \"remediations\" : 0,\n            \"recommendations\" : 0,\n            \"unscanned\" : 0\n          },\n          \"dependencies\" : [ {\n            \"ref\" : \"pkg:pypi/setuptools@39.2.0\",\n            \"issues\" : [ {\n              \"id\" : \"CVE-2024-6345\",\n              \"source\" : \"osv-github\",\n              \"cvssScore\" : 8.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-6345\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2022-40897\",\n              \"source\" : \"osv-github\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2022-40897\" ],\n              \"unique\" : false\n            } ],\n            \"transitive\" : [ ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2024-6345\",\n              \"source\" : \"osv-github\",\n              \"cvssScore\" : 8.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-6345\" ],\n              \"unique\" : false\n            }\n          } ]\n        },\n        \"redhat-csaf\" : {\n          \"summary\" : {\n            \"direct\" : 50,\n            \"transitive\" : 338,\n            \"total\" : 388,\n            \"dependencies\" : 57,\n            \"critical\" : 7,\n            \"high\" : 134,\n            \"medium\" : 228,\n            \"low\" : 19,\n            \"remediations\" : 0,\n            \"recommendations\" : 0,\n            \"unscanned\" : 0\n          },\n          \"dependencies\" : [ {\n            \"ref\" : \"pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm\",\n            \"issues\" : [ {\n              \"id\" : \"CVE-2023-40217\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 8.6,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2023-40217\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2022-42919\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2022-42919\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2023-6597\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2023-6597\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2015-20107\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.6,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2015-20107\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-12718\",\n              \"title\" : \"Bypass extraction filter to modify file metadata outside extraction directory\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.6,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-12718\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-4517\",\n              \"title\" : \"Arbitrary writes via tarfile realpath overflow\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.6,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-4517\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2020-10735\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2020-10735\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2022-45061\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2022-45061\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2023-24329\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2023-24329\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-6232\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-6232\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-12084\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-12084\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-4138\",\n              \"title\" : \"Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-4138\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-4435\",\n              \"title\" : \"Tarfile extracts filtered members when errorlevel=0\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-4435\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-8194\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-8194\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2021-28861\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.4,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2021-28861\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-4330\",\n              \"title\" : \"Extraction filter bypass for linking outside extraction directory\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.3,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-4330\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-15366\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.1,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-15366\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-15367\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.1,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-15367\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2026-1299\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.1,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2026-1299\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2026-4519\",\n              \"title\" : \"webbrowser.open() allows leading dashes in URLs\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.1,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2026-4519\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-6923\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.8,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2024-6923\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-0938\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.8,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2025-0938\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-13836\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.8,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2025-13836\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-9287\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.3,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2024-9287\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-0450\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.2,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2024-0450\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2007-4559\",\n              \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 5.5,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2007-4559\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2023-27043\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 5.3,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2023-27043\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-8088\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 5.3,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2024-8088\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-0397\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 5.0,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2024-0397\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-7592\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 4.8,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2024-7592\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2026-0865\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 4.5,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2026-0865\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-6069\",\n              \"title\" : \"HTMLParser quadratic complexity when processing malformed inputs\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 4.3,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2025-6069\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-8291\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 4.3,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2025-8291\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-6075\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 4.0,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2025-6075\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-11168\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 3.7,\n              \"severity\" : \"LOW\",\n              \"cves\" : [ \"CVE-2024-11168\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-4032\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 3.7,\n              \"severity\" : \"LOW\",\n              \"cves\" : [ \"CVE-2024-4032\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-5642\",\n              \"title\" : \"Buffer overread when using an empty list with SSLContext.set_npn_protocols()\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 2.7,\n              \"severity\" : \"LOW\",\n              \"cves\" : [ \"CVE-2024-5642\" ],\n              \"unique\" : false\n            } ],\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1473\",\n                \"title\" : \"Resource leakage when decoding certificates and keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1473\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3358\",\n                \"title\" : \"Using a Custom Cipher with NID_undef may lead to NULL encryption\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3358\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3602\",\n                \"title\" : \"X.509 Email Address 4-byte Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3602\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3786\",\n                \"title\" : \"X.509 Email Address Variable Length Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3786\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4450\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-4450\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0215\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0215\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0216\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0216\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0217\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0401\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0401\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5363\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-5363\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0286\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0286\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12797\",\n                \"title\" : \"RFC7250 handshakes with unauthenticated servers don't abort as expected\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-12797\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69419\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69419\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1292\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1292\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2068\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2068\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2650\",\n                \"title\" : \"Possible DoS translating ASN.1 object identifiers\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2650\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6129\",\n                \"title\" : \"POLY1305 MAC implementation corrupts vector registers on PowerPC\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6129\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69421\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69421\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-11187\",\n                \"title\" : \"Improper validation of PBMAC1 parameters in PKCS#12 MAC verification\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-11187\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-1971\",\n                \"title\" : \"EDIPARTYNAME NULL pointer dereference\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-1971\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4304\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4304\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0464\",\n                \"title\" : \"Excessive Resource Usage Verifying X.509 Policy Constraints\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0464\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6237\",\n                \"title\" : \"Excessive time spent checking invalid RSA public keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6237\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-5535\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-5535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6119\",\n                \"title\" : \"Possible denial of service in X.509 name checks\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-6119\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15468\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15468\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-66199\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-66199\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69420\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69420\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22796\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22796\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4741\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4741\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9230\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9230\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0727\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0727\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15469\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15469\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1343\",\n                \"title\" : \"OCSP_basic_verify may incorrectly verify the response signing certificate\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1343\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2097\",\n                \"title\" : \"AES OCB fails to encrypt some bytes\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2097\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0465\",\n                \"title\" : \"Invalid certificate policies in leaf certificates are silently ignored\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0465\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0466\",\n                \"title\" : \"Certificate policy check not enabled\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0466\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2975\",\n                \"title\" : \"AES-SIV implementation ignores empty associated data entries\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3446\",\n                \"title\" : \"Excessive time spent checking DH keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3446\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3817\",\n                \"title\" : \"Excessive time spent checking DH q parameter value\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3817\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5678\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-5678\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4603\",\n                \"title\" : \"Excessive time spent checking DSA keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1255\",\n                \"title\" : \"Input buffer over-read in AES-XTS implementation on 64 bit ARM\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1255\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4203\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4203\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-68160\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-68160\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69418\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69418\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2511\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-2511\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42898\",\n                \"title\" : \"PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \\\"a similar bug.\\\"\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-42898\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-39975\",\n                \"title\" : \"kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-39975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26462\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-26462\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37370\",\n                \"title\" : \"In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-37370\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-17049\",\n                \"title\" : \"Kerberos KDC Security Feature Bypass Vulnerability\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2020-17049\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-36054\",\n                \"title\" : \"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-36054\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37371\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-37371\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-24528\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-24528\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26458\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26458\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26461\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26461\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3576\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-3576\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-6345\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-6345\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-47273\",\n                \"title\" : \"setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-47273\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-40897\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-40897\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-6345\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-6345\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1271\",\n                \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1271\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-31115\",\n                \"title\" : \"XZ has a heap-use-after-free bug in threaded .xz decoder\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-31115\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1271\",\n                \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1271\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-40217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-40217\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42919\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-42919\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6597\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-6597\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2015-20107\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2015-20107\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12718\",\n                \"title\" : \"Bypass extraction filter to modify file metadata outside extraction directory\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-12718\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4517\",\n                \"title\" : \"Arbitrary writes via tarfile realpath overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4517\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-10735\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2020-10735\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-45061\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-45061\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-24329\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-24329\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6232\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-6232\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-12084\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-12084\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4138\",\n                \"title\" : \"Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4138\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4435\",\n                \"title\" : \"Tarfile extracts filtered members when errorlevel=0\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4435\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8194\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-8194\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-28861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-28861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4330\",\n                \"title\" : \"Extraction filter bypass for linking outside extraction directory\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4330\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15366\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-15366\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15367\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-15367\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-1299\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-1299\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-4519\",\n                \"title\" : \"webbrowser.open() allows leading dashes in URLs\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-4519\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6923\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-6923\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0938\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0938\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-13836\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-13836\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-9287\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-9287\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0450\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0450\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2007-4559\",\n                \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2007-4559\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27043\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27043\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-8088\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-8088\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0397\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0397\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-7592\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-7592\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0865\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0865\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6069\",\n                \"title\" : \"HTMLParser quadratic complexity when processing malformed inputs\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-6069\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8291\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8291\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6075\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-6075\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-11168\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-11168\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4032\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-4032\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-5642\",\n                \"title\" : \"Buffer overread when using an empty list with SSLContext.set_npn_protocols()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 2.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-5642\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-40217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-40217\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-37434\",\n                \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-37434\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2602\",\n                \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.3,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-2602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-6965\",\n                \"title\" : \"Integer Truncation on SQLite\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6965\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-7104\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-7104\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3277\",\n                \"title\" : \"An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-3277\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-35737\",\n                \"title\" : \"SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-35737\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-6965\",\n                \"title\" : \"Integer Truncation on SQLite\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6965\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-52425\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-52425\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28757\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-28757\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-45490\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-45490\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-45491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-45491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-8176\",\n                \"title\" : \"Libexpat: expat: improper restriction of xml entity expansion depth in libexpat\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-8176\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-45492\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-45492\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-50602\",\n                \"title\" : \"An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-50602\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-59375\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-59375\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-52425\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-52425\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-46828\",\n                \"title\" : \"In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-46828\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-46828\",\n                \"title\" : \"In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-46828\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12133\",\n                \"title\" : \"Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-12133\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2007-4559\",\n                \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2007-4559\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2007-4559\",\n                \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2007-4559\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2025-15467\",\n              \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 9.8,\n              \"severity\" : \"CRITICAL\",\n              \"cves\" : [ \"CVE-2025-15467\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm\",\n            \"issues\" : [ {\n              \"id\" : \"CVE-2023-2953\",\n              \"title\" : \"A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.1,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2023-2953\" ],\n              \"unique\" : false\n            } ],\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1473\",\n                \"title\" : \"Resource leakage when decoding certificates and keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1473\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3358\",\n                \"title\" : \"Using a Custom Cipher with NID_undef may lead to NULL encryption\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3358\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3602\",\n                \"title\" : \"X.509 Email Address 4-byte Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3602\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3786\",\n                \"title\" : \"X.509 Email Address Variable Length Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3786\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4450\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-4450\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0215\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0215\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0216\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0216\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0217\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0401\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0401\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5363\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-5363\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0286\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0286\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12797\",\n                \"title\" : \"RFC7250 handshakes with unauthenticated servers don't abort as expected\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-12797\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69419\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69419\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1292\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1292\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2068\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2068\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2650\",\n                \"title\" : \"Possible DoS translating ASN.1 object identifiers\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2650\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6129\",\n                \"title\" : \"POLY1305 MAC implementation corrupts vector registers on PowerPC\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6129\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69421\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69421\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-11187\",\n                \"title\" : \"Improper validation of PBMAC1 parameters in PKCS#12 MAC verification\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-11187\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-1971\",\n                \"title\" : \"EDIPARTYNAME NULL pointer dereference\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-1971\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4304\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4304\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0464\",\n                \"title\" : \"Excessive Resource Usage Verifying X.509 Policy Constraints\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0464\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6237\",\n                \"title\" : \"Excessive time spent checking invalid RSA public keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6237\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-5535\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-5535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6119\",\n                \"title\" : \"Possible denial of service in X.509 name checks\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-6119\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15468\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15468\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-66199\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-66199\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69420\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69420\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22796\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22796\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4741\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4741\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9230\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9230\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0727\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0727\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15469\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15469\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1343\",\n                \"title\" : \"OCSP_basic_verify may incorrectly verify the response signing certificate\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1343\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2097\",\n                \"title\" : \"AES OCB fails to encrypt some bytes\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2097\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0465\",\n                \"title\" : \"Invalid certificate policies in leaf certificates are silently ignored\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0465\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0466\",\n                \"title\" : \"Certificate policy check not enabled\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0466\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2975\",\n                \"title\" : \"AES-SIV implementation ignores empty associated data entries\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3446\",\n                \"title\" : \"Excessive time spent checking DH keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3446\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3817\",\n                \"title\" : \"Excessive time spent checking DH q parameter value\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3817\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5678\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-5678\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4603\",\n                \"title\" : \"Excessive time spent checking DSA keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1255\",\n                \"title\" : \"Input buffer over-read in AES-XTS implementation on 64 bit ARM\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1255\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4203\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4203\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-68160\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-68160\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69418\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69418\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2511\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-2511\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42898\",\n                \"title\" : \"PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \\\"a similar bug.\\\"\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-42898\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-39975\",\n                \"title\" : \"kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-39975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26462\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-26462\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37370\",\n                \"title\" : \"In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-37370\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-17049\",\n                \"title\" : \"Kerberos KDC Security Feature Bypass Vulnerability\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2020-17049\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-36054\",\n                \"title\" : \"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-36054\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37371\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-37371\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-24528\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-24528\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26458\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26458\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26461\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26461\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3576\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-3576\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-37434\",\n                \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-37434\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2602\",\n                \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.3,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-2602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12133\",\n                \"title\" : \"Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-12133\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2025-15467\",\n              \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 9.8,\n              \"severity\" : \"CRITICAL\",\n              \"cves\" : [ \"CVE-2025-15467\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm\",\n            \"issues\" : [ {\n              \"id\" : \"CVE-2026-21945\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.5,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2026-21945\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-64720\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.1,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-64720\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2025-65018\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 7.1,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2025-65018\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2026-21933\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.1,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2026-21933\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2026-21925\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 4.8,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2026-21925\" ],\n              \"unique\" : false\n            } ],\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1473\",\n                \"title\" : \"Resource leakage when decoding certificates and keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1473\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3358\",\n                \"title\" : \"Using a Custom Cipher with NID_undef may lead to NULL encryption\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3358\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3602\",\n                \"title\" : \"X.509 Email Address 4-byte Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3602\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3786\",\n                \"title\" : \"X.509 Email Address Variable Length Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3786\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4450\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-4450\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0215\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0215\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0216\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0216\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0217\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0401\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0401\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5363\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-5363\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0286\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0286\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12797\",\n                \"title\" : \"RFC7250 handshakes with unauthenticated servers don't abort as expected\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-12797\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69419\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69419\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1292\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1292\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2068\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2068\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2650\",\n                \"title\" : \"Possible DoS translating ASN.1 object identifiers\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2650\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6129\",\n                \"title\" : \"POLY1305 MAC implementation corrupts vector registers on PowerPC\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6129\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69421\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69421\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-11187\",\n                \"title\" : \"Improper validation of PBMAC1 parameters in PKCS#12 MAC verification\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-11187\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-1971\",\n                \"title\" : \"EDIPARTYNAME NULL pointer dereference\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-1971\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4304\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4304\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0464\",\n                \"title\" : \"Excessive Resource Usage Verifying X.509 Policy Constraints\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0464\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6237\",\n                \"title\" : \"Excessive time spent checking invalid RSA public keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6237\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-5535\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-5535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6119\",\n                \"title\" : \"Possible denial of service in X.509 name checks\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-6119\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15468\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15468\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-66199\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-66199\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69420\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69420\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22796\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22796\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4741\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4741\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9230\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9230\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0727\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0727\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15469\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15469\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1343\",\n                \"title\" : \"OCSP_basic_verify may incorrectly verify the response signing certificate\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1343\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2097\",\n                \"title\" : \"AES OCB fails to encrypt some bytes\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2097\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0465\",\n                \"title\" : \"Invalid certificate policies in leaf certificates are silently ignored\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0465\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0466\",\n                \"title\" : \"Certificate policy check not enabled\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0466\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2975\",\n                \"title\" : \"AES-SIV implementation ignores empty associated data entries\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3446\",\n                \"title\" : \"Excessive time spent checking DH keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3446\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3817\",\n                \"title\" : \"Excessive time spent checking DH q parameter value\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3817\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5678\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-5678\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4603\",\n                \"title\" : \"Excessive time spent checking DSA keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1255\",\n                \"title\" : \"Input buffer over-read in AES-XTS implementation on 64 bit ARM\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1255\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4203\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4203\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-68160\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-68160\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69418\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69418\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2511\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-2511\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42898\",\n                \"title\" : \"PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \\\"a similar bug.\\\"\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-42898\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-39975\",\n                \"title\" : \"kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-39975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26462\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-26462\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37370\",\n                \"title\" : \"In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-37370\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-17049\",\n                \"title\" : \"Kerberos KDC Security Feature Bypass Vulnerability\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2020-17049\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-36054\",\n                \"title\" : \"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-36054\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37371\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-37371\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-24528\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-24528\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26458\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26458\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26461\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26461\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3576\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-3576\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-6345\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-6345\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-47273\",\n                \"title\" : \"setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-47273\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-40897\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-40897\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-6345\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-6345\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/javapackages-filesystem@5.3.0-1.module%2Bel8%2B2447%2B6f56d9a6?arch=noarch\u0026distro=rhel-8.10\u0026upstream=javapackages-tools-5.3.0-1.module%2Bel8%2B2447%2B6f56d9a6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-48734\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-48734\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2019-10086\",\n                \"title\" : \"In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2019-10086\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-48734\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-48734\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1271\",\n                \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1271\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-31115\",\n                \"title\" : \"XZ has a heap-use-after-free bug in threaded .xz decoder\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-31115\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1271\",\n                \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1271\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-40217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-40217\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42919\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-42919\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6597\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-6597\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2015-20107\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2015-20107\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12718\",\n                \"title\" : \"Bypass extraction filter to modify file metadata outside extraction directory\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-12718\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4517\",\n                \"title\" : \"Arbitrary writes via tarfile realpath overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4517\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-10735\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2020-10735\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-45061\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-45061\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-24329\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-24329\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6232\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-6232\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-12084\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-12084\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4138\",\n                \"title\" : \"Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4138\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4435\",\n                \"title\" : \"Tarfile extracts filtered members when errorlevel=0\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4435\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8194\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-8194\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-28861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-28861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4330\",\n                \"title\" : \"Extraction filter bypass for linking outside extraction directory\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4330\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15366\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-15366\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15367\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-15367\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-1299\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-1299\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-4519\",\n                \"title\" : \"webbrowser.open() allows leading dashes in URLs\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-4519\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6923\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-6923\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0938\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0938\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-13836\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-13836\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-9287\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-9287\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0450\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0450\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2007-4559\",\n                \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2007-4559\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27043\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27043\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-8088\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-8088\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0397\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0397\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-7592\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-7592\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0865\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0865\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6069\",\n                \"title\" : \"HTMLParser quadratic complexity when processing malformed inputs\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-6069\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8291\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8291\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6075\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-6075\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-11168\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-11168\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4032\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-4032\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-5642\",\n                \"title\" : \"Buffer overread when using an empty list with SSLContext.set_npn_protocols()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 2.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-5642\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-40217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-40217\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-37434\",\n                \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-37434\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/cups-libs@2.2.6-67.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=cups-2.2.6-67.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-58060\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-58060\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-47175\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-47175\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-34241\",\n                \"title\" : \"CUPS vulnerable to use-after-free in cupsdAcceptClient()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-34241\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-26691\",\n                \"title\" : \"A logic issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. An application may be able to gain elevated privileges.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-26691\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-32360\",\n                \"title\" : \"An authentication issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. An unauthenticated user may be able to access recently printed documents.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-32360\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-58364\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-58364\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-32324\",\n                \"title\" : \"OpenPrinting CUPS vulnerable to heap buffer overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-32324\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-58436\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-58436\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-35235\",\n                \"title\" : \"Cupsd Listen arbitrary chmod 0140777\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-35235\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-58060\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-58060\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2602\",\n                \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.3,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-2602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-6965\",\n                \"title\" : \"Integer Truncation on SQLite\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6965\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-7104\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-7104\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3277\",\n                \"title\" : \"An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-3277\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-35737\",\n                \"title\" : \"SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-35737\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-6965\",\n                \"title\" : \"Integer Truncation on SQLite\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6965\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-52425\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-52425\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28757\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-28757\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-45490\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-45490\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-45491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-45491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-8176\",\n                \"title\" : \"Libexpat: expat: improper restriction of xml entity expansion depth in libexpat\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-8176\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-45492\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-45492\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-50602\",\n                \"title\" : \"An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-50602\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-59375\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-59375\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-52425\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-52425\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-2509\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-2509\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0553\",\n                \"title\" : \"Gnutls: incomplete fix for cve-2023-5981\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-0553\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0567\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-0567\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0361\",\n                \"title\" : \"A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0361\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32988\",\n                \"title\" : \"Gnutls: vulnerability in gnutls othername san export\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-32988\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32990\",\n                \"title\" : \"Gnutls: vulnerability in gnutls certtool template parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-32990\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6395\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-6395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5981\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-5981\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12243\",\n                \"title\" : \"Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-12243\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28834\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-28834\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14831\",\n                \"title\" : \"Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14831\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32989\",\n                \"title\" : \"Gnutls: vulnerability in gnutls sct extension parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-32989\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28835\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-28835\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9820\",\n                \"title\" : \"Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9820\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-2509\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-2509\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-46828\",\n                \"title\" : \"In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-46828\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-46828\",\n                \"title\" : \"In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-46828\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/lua@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-44964\",\n                \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-44964\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-33099\",\n                \"title\" : \"An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-33099\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-28805\",\n                \"title\" : \"singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-28805\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-43519\",\n                \"title\" : \"Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43519\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-44964\",\n                \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-44964\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-44964\",\n                \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-44964\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-33099\",\n                \"title\" : \"An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-33099\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-28805\",\n                \"title\" : \"singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-28805\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-43519\",\n                \"title\" : \"Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43519\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-44964\",\n                \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-44964\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/dbus-libs@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-42010\",\n                \"title\" : \"An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-42010\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42011\",\n                \"title\" : \"An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-42011\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42012\",\n                \"title\" : \"An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-42012\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-34969\",\n                \"title\" : \"D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-34969\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-42010\",\n                \"title\" : \"An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-42010\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/avahi-libs@0.7-27.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=avahi-0.7-27.el8_10.1.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-3468\",\n                \"title\" : \"A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-3468\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1981\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1981\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38469\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-38469\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38470\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-38470\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38471\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-38471\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38472\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-38472\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38473\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-38473\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-3502\",\n                \"title\" : \"A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-3502\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-52615\",\n                \"title\" : \"Avahi: avahi wide-area dns uses constant source port\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-52615\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-52616\",\n                \"title\" : \"Avahi: avahi wide-area dns predictable transaction ids\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-52616\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-3468\",\n                \"title\" : \"A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-3468\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-27456\",\n                \"title\" : \"util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-27456\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=systemd-239-82.el8_10.15.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-7008\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-7008\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3821\",\n                \"title\" : \"An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3821\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4415\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4415\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-45873\",\n                \"title\" : \"systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-45873\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4598\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-4598\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-7008\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-7008\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12133\",\n                \"title\" : \"Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-12133\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2236\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-2236\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2236\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-2236\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2007-4559\",\n                \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2007-4559\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2007-4559\",\n                \"title\" : \"Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2007-4559\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/alsa-lib@1.2.10-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=alsa-lib-1.2.10-2.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2026-25068\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-25068\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2026-25068\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-25068\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2025-15467\",\n              \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 9.8,\n              \"severity\" : \"CRITICAL\",\n              \"cves\" : [ \"CVE-2025-15467\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\",\n            \"issues\" : [ {\n              \"id\" : \"CVE-2021-35938\",\n              \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.5,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2021-35938\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2021-35939\",\n              \"title\" : \"It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.5,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2021-35939\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2021-35937\",\n              \"title\" : \"A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 6.3,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2021-35937\" ],\n              \"unique\" : false\n            } ],\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1473\",\n                \"title\" : \"Resource leakage when decoding certificates and keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1473\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3358\",\n                \"title\" : \"Using a Custom Cipher with NID_undef may lead to NULL encryption\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3358\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3602\",\n                \"title\" : \"X.509 Email Address 4-byte Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3602\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3786\",\n                \"title\" : \"X.509 Email Address Variable Length Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3786\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4450\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-4450\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0215\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0215\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0216\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0216\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0217\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0401\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0401\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5363\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-5363\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0286\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0286\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12797\",\n                \"title\" : \"RFC7250 handshakes with unauthenticated servers don't abort as expected\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-12797\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69419\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69419\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1292\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1292\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2068\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2068\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2650\",\n                \"title\" : \"Possible DoS translating ASN.1 object identifiers\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2650\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6129\",\n                \"title\" : \"POLY1305 MAC implementation corrupts vector registers on PowerPC\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6129\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69421\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69421\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-11187\",\n                \"title\" : \"Improper validation of PBMAC1 parameters in PKCS#12 MAC verification\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-11187\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-1971\",\n                \"title\" : \"EDIPARTYNAME NULL pointer dereference\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-1971\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4304\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4304\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0464\",\n                \"title\" : \"Excessive Resource Usage Verifying X.509 Policy Constraints\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0464\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6237\",\n                \"title\" : \"Excessive time spent checking invalid RSA public keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6237\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-5535\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-5535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6119\",\n                \"title\" : \"Possible denial of service in X.509 name checks\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-6119\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15468\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15468\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-66199\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-66199\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69420\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69420\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22796\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22796\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4741\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4741\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9230\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9230\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0727\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0727\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15469\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15469\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1343\",\n                \"title\" : \"OCSP_basic_verify may incorrectly verify the response signing certificate\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1343\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2097\",\n                \"title\" : \"AES OCB fails to encrypt some bytes\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2097\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0465\",\n                \"title\" : \"Invalid certificate policies in leaf certificates are silently ignored\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0465\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0466\",\n                \"title\" : \"Certificate policy check not enabled\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0466\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2975\",\n                \"title\" : \"AES-SIV implementation ignores empty associated data entries\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3446\",\n                \"title\" : \"Excessive time spent checking DH keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3446\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3817\",\n                \"title\" : \"Excessive time spent checking DH q parameter value\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3817\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5678\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-5678\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4603\",\n                \"title\" : \"Excessive time spent checking DSA keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1255\",\n                \"title\" : \"Input buffer over-read in AES-XTS implementation on 64 bit ARM\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1255\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4203\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4203\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-68160\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-68160\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69418\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69418\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2511\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-2511\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-32207\",\n                \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2022-32207\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-22576\",\n                \"title\" : \"An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-22576\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38545\",\n                \"title\" : \"This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\\nhandshake.\\n\\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\\nthat to resolve the address instead of it getting done by curl itself, the\\nmaximum length that host name can be is 255 bytes.\\n\\nIf the host name is detected to be longer, curl switches to local name\\nresolving and instead passes on the resolved address only. Due to this bug,\\nthe local variable that means \\\"let the host resolve the name\\\" could get the\\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\\ncopy the too long host name to the target buffer instead of copying just the\\nresolved address there.\\n\\nThe target buffer being a heap based buffer, and the host name coming from the\\nURL that curl has been told to operate with.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-38545\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27775\",\n                \"title\" : \"An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-27775\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27782\",\n                \"title\" : \"libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-27782\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2398\",\n                \"title\" : \"HTTP/2 push headers memory-leak\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2398\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32206\",\n                \"title\" : \"curl \u003c 7.84.0 supports \\\"chained\\\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \\\"malloc bomb\\\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32206\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-23916\",\n                \"title\" : \"An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \\\"chained\\\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \\\"malloc bomb\\\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-23916\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-43552\",\n                \"title\" : \"A use after free vulnerability exists in curl \u003c7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-43552\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27535\",\n                \"title\" : \"An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27536\",\n                \"title\" : \"An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27536\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28321\",\n                \"title\" : \"An improper certificate validation vulnerability exists in curl \u003cv8.1.0 in the way it supports matching of wildcard patterns when listed as \\\"Subject Alternative Name\\\" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-28321\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27538\",\n                \"title\" : \"An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27538\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32208\",\n                \"title\" : \"When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32208\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-46218\",\n                \"title\" : \"This flaw allows a malicious HTTP server to set \\\"super cookies\\\" in curl that\\nare then passed back to more origins than what is otherwise allowed or\\npossible. This allows a site to set cookies that then would get sent to\\ndifferent and unrelated sites and domains.\\n\\nIt could do this by exploiting a mixed case flaw in curl's function that\\nverifies a given cookie domain against the Public Suffix List (PSL). For\\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-46218\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9086\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9086\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27774\",\n                \"title\" : \"An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-27774\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32221\",\n                \"title\" : \"When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32221\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27776\",\n                \"title\" : \"A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-27776\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27533\",\n                \"title\" : \"A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \\\"telnet options\\\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27533\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27534\",\n                \"title\" : \"A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-27534\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28322\",\n                \"title\" : \"An information disclosure vulnerability exists in curl \u003cv8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-28322\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38546\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-38546\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-35252\",\n                \"title\" : \"When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\\\"sister site\\\" to deny service to all siblings.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.1,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2022-35252\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-32207\",\n                \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2022-32207\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-32207\",\n                \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2022-32207\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-22576\",\n                \"title\" : \"An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-22576\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38545\",\n                \"title\" : \"This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\\nhandshake.\\n\\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\\nthat to resolve the address instead of it getting done by curl itself, the\\nmaximum length that host name can be is 255 bytes.\\n\\nIf the host name is detected to be longer, curl switches to local name\\nresolving and instead passes on the resolved address only. Due to this bug,\\nthe local variable that means \\\"let the host resolve the name\\\" could get the\\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\\ncopy the too long host name to the target buffer instead of copying just the\\nresolved address there.\\n\\nThe target buffer being a heap based buffer, and the host name coming from the\\nURL that curl has been told to operate with.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-38545\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15079\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-15079\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27775\",\n                \"title\" : \"An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-27775\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27782\",\n                \"title\" : \"libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-27782\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2398\",\n                \"title\" : \"HTTP/2 push headers memory-leak\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2398\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-13034\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-13034\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14819\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14819\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-1965\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-1965\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32206\",\n                \"title\" : \"curl \u003c 7.84.0 supports \\\"chained\\\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \\\"malloc bomb\\\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32206\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-23916\",\n                \"title\" : \"An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \\\"chained\\\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \\\"malloc bomb\\\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-23916\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14524\",\n                \"title\" : \"bearer token leak on cross-protocol redirect\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14524\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-3784\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-3784\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-3805\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-3805\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-43552\",\n                \"title\" : \"A use after free vulnerability exists in curl \u003c7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-43552\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27535\",\n                \"title\" : \"An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27536\",\n                \"title\" : \"An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27536\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28321\",\n                \"title\" : \"An improper certificate validation vulnerability exists in curl \u003cv8.1.0 in the way it supports matching of wildcard patterns when listed as \\\"Subject Alternative Name\\\" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-28321\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-10966\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-10966\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-3783\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-3783\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27538\",\n                \"title\" : \"An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27538\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32208\",\n                \"title\" : \"When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32208\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-46218\",\n                \"title\" : \"This flaw allows a malicious HTTP server to set \\\"super cookies\\\" in curl that\\nare then passed back to more origins than what is otherwise allowed or\\npossible. This allows a site to set cookies that then would get sent to\\ndifferent and unrelated sites and domains.\\n\\nIt could do this by exploiting a mixed case flaw in curl's function that\\nverifies a given cookie domain against the Public Suffix List (PSL). For\\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-46218\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9086\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9086\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27774\",\n                \"title\" : \"An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-27774\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32221\",\n                \"title\" : \"When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32221\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-10148\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-10148\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14017\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14017\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15224\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15224\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27776\",\n                \"title\" : \"A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-27776\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27533\",\n                \"title\" : \"A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \\\"telnet options\\\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27533\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27534\",\n                \"title\" : \"A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-27534\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28322\",\n                \"title\" : \"An information disclosure vulnerability exists in curl \u003cv8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-28322\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38546\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-38546\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-35252\",\n                \"title\" : \"When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\\\"sister site\\\" to deny service to all siblings.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.1,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2022-35252\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-32207\",\n                \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2022-32207\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-40896\",\n                \"title\" : \"In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \\\"checked\\\"). This makes classic XXE attacks possible.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.1,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-40896\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-49794\",\n                \"title\" : \"Libxml: heap use after free (uaf) leads to denial of service (dos)\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.1,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-49794\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-49796\",\n                \"title\" : \"Libxml: type confusion leads to denial of service (dos)\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.1,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-49796\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-56171\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-56171\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-40304\",\n                \"title\" : \"An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-40304\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-24928\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-24928\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-7425\",\n                \"title\" : \"Libxslt: heap use-after-free in libxslt caused by atype corruption in xmlattrptr\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-7425\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-40303\",\n                \"title\" : \"An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-40303\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-25062\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-25062\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32415\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-32415\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-49795\",\n                \"title\" : \"Libxml: null pointer dereference leads to denial of service (dos)\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-49795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6021\",\n                \"title\" : \"Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6021\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-7424\",\n                \"title\" : \"Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-7424\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29824\",\n                \"title\" : \"In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-29824\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-39615\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-39615\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9714\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9714\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-49043\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-49043\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28484\",\n                \"title\" : \"In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-28484\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-29469\",\n                \"title\" : \"An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the '\\\\0' value).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-29469\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32414\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-32414\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6170\",\n                \"title\" : \"Libxml2: stack buffer overflow in xmllint interactive shell command handling\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 2.5,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2025-6170\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-40896\",\n                \"title\" : \"In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \\\"checked\\\"). This makes classic XXE attacks possible.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.1,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-40896\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42898\",\n                \"title\" : \"PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \\\"a similar bug.\\\"\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-42898\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-39975\",\n                \"title\" : \"kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-39975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26462\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-26462\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37370\",\n                \"title\" : \"In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-37370\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-17049\",\n                \"title\" : \"Kerberos KDC Security Feature Bypass Vulnerability\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2020-17049\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-36054\",\n                \"title\" : \"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-36054\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37371\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-37371\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-24528\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-24528\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26458\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26458\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26461\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26461\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3576\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-3576\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1271\",\n                \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1271\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-31115\",\n                \"title\" : \"XZ has a heap-use-after-free bug in threaded .xz decoder\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-31115\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1271\",\n                \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1271\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-37434\",\n                \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-37434\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-5318\",\n                \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5318\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5987\",\n                \"title\" : \"Libssh: invalid return code for chacha20 poly1305 with openssl backend\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5987\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-48795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-48795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2283\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2283\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6004\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6004\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1667\",\n                \"title\" : \"A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1667\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6918\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-6918\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-5318\",\n                \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5318\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-5318\",\n                \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5318\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5987\",\n                \"title\" : \"Libssh: invalid return code for chacha20 poly1305 with openssl backend\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5987\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-48795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-48795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2283\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2283\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6004\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6004\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1667\",\n                \"title\" : \"A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1667\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6918\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-6918\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-5318\",\n                \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5318\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-5914\",\n                \"title\" : \"Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5914\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-4111\",\n                \"title\" : \"Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-4111\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-4424\",\n                \"title\" : \"Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-4424\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-5121\",\n                \"title\" : \"Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-5121\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-26280\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-26280\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-36227\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-36227\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-57970\",\n                \"title\" : \"libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-57970\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-25724\",\n                \"title\" : \"list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-25724\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-5914\",\n                \"title\" : \"Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5914\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2602\",\n                \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.3,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-2602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-6965\",\n                \"title\" : \"Integer Truncation on SQLite\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6965\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-7104\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-7104\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3277\",\n                \"title\" : \"An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-3277\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-35737\",\n                \"title\" : \"SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-35737\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-6965\",\n                \"title\" : \"Integer Truncation on SQLite\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6965\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-44487\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-44487\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-27135\",\n                \"title\" : \"nghttp2 Denial of service: Assertion failure due to the missing state validation\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-27135\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28182\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-28182\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-44487\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-44487\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-6176\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6176\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-6176\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6176\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-2953\",\n                \"title\" : \"A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2953\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-2953\",\n                \"title\" : \"A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2953\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-44964\",\n                \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-44964\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-33099\",\n                \"title\" : \"An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-33099\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-28805\",\n                \"title\" : \"singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-28805\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-43519\",\n                \"title\" : \"Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43519\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-44964\",\n                \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-44964\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-35938\",\n                \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35938\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-35939\",\n                \"title\" : \"It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35939\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-35937\",\n                \"title\" : \"A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35937\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-35938\",\n                \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35938\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-35938\",\n                \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35938\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-35939\",\n                \"title\" : \"It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35939\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-35937\",\n                \"title\" : \"A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35937\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-35938\",\n                \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35938\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12133\",\n                \"title\" : \"Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-12133\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2025-15467\",\n              \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 9.8,\n              \"severity\" : \"CRITICAL\",\n              \"cves\" : [ \"CVE-2025-15467\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=microdnf-3.8.0-2.el8.src.rpm\",\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1473\",\n                \"title\" : \"Resource leakage when decoding certificates and keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1473\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3358\",\n                \"title\" : \"Using a Custom Cipher with NID_undef may lead to NULL encryption\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3358\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3602\",\n                \"title\" : \"X.509 Email Address 4-byte Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3602\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3786\",\n                \"title\" : \"X.509 Email Address Variable Length Buffer Overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3786\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4450\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-4450\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0215\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0215\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0216\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0216\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0217\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0217\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0401\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0401\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5363\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-5363\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0286\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0286\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12797\",\n                \"title\" : \"RFC7250 handshakes with unauthenticated servers don't abort as expected\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-12797\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69419\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69419\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1292\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1292\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2068\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2068\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2650\",\n                \"title\" : \"Possible DoS translating ASN.1 object identifiers\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2650\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6129\",\n                \"title\" : \"POLY1305 MAC implementation corrupts vector registers on PowerPC\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6129\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69421\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69421\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-11187\",\n                \"title\" : \"Improper validation of PBMAC1 parameters in PKCS#12 MAC verification\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-11187\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-1971\",\n                \"title\" : \"EDIPARTYNAME NULL pointer dereference\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-1971\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4304\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4304\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0464\",\n                \"title\" : \"Excessive Resource Usage Verifying X.509 Policy Constraints\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0464\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6237\",\n                \"title\" : \"Excessive time spent checking invalid RSA public keys\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6237\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-5535\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-5535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-6119\",\n                \"title\" : \"Possible denial of service in X.509 name checks\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-6119\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15468\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15468\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-66199\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-66199\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69420\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69420\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22796\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22796\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4741\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4741\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9230\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9230\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0727\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-0727\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15469\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15469\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-22795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-22795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1343\",\n                \"title\" : \"OCSP_basic_verify may incorrectly verify the response signing certificate\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1343\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-2097\",\n                \"title\" : \"AES OCB fails to encrypt some bytes\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-2097\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0465\",\n                \"title\" : \"Invalid certificate policies in leaf certificates are silently ignored\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0465\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0466\",\n                \"title\" : \"Certificate policy check not enabled\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-0466\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2975\",\n                \"title\" : \"AES-SIV implementation ignores empty associated data entries\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3446\",\n                \"title\" : \"Excessive time spent checking DH keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3446\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-3817\",\n                \"title\" : \"Excessive time spent checking DH q parameter value\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-3817\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5678\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-5678\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-4603\",\n                \"title\" : \"Excessive time spent checking DSA keys and parameters\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-4603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1255\",\n                \"title\" : \"Input buffer over-read in AES-XTS implementation on 64 bit ARM\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1255\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4203\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4203\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-68160\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-68160\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69418\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-69418\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2511\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-2511\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-15467\",\n                \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-15467\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-32207\",\n                \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2022-32207\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-22576\",\n                \"title\" : \"An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-22576\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38545\",\n                \"title\" : \"This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\\nhandshake.\\n\\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\\nthat to resolve the address instead of it getting done by curl itself, the\\nmaximum length that host name can be is 255 bytes.\\n\\nIf the host name is detected to be longer, curl switches to local name\\nresolving and instead passes on the resolved address only. Due to this bug,\\nthe local variable that means \\\"let the host resolve the name\\\" could get the\\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\\ncopy the too long host name to the target buffer instead of copying just the\\nresolved address there.\\n\\nThe target buffer being a heap based buffer, and the host name coming from the\\nURL that curl has been told to operate with.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-38545\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27775\",\n                \"title\" : \"An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-27775\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27782\",\n                \"title\" : \"libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-27782\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2398\",\n                \"title\" : \"HTTP/2 push headers memory-leak\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2398\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32206\",\n                \"title\" : \"curl \u003c 7.84.0 supports \\\"chained\\\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \\\"malloc bomb\\\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32206\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-23916\",\n                \"title\" : \"An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \\\"chained\\\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \\\"malloc bomb\\\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-23916\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-43552\",\n                \"title\" : \"A use after free vulnerability exists in curl \u003c7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-43552\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27535\",\n                \"title\" : \"An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27536\",\n                \"title\" : \"An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27536\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28321\",\n                \"title\" : \"An improper certificate validation vulnerability exists in curl \u003cv8.1.0 in the way it supports matching of wildcard patterns when listed as \\\"Subject Alternative Name\\\" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-28321\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27538\",\n                \"title\" : \"An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27538\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32208\",\n                \"title\" : \"When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32208\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-46218\",\n                \"title\" : \"This flaw allows a malicious HTTP server to set \\\"super cookies\\\" in curl that\\nare then passed back to more origins than what is otherwise allowed or\\npossible. This allows a site to set cookies that then would get sent to\\ndifferent and unrelated sites and domains.\\n\\nIt could do this by exploiting a mixed case flaw in curl's function that\\nverifies a given cookie domain against the Public Suffix List (PSL). For\\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-46218\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9086\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9086\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27774\",\n                \"title\" : \"An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-27774\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32221\",\n                \"title\" : \"When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32221\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27776\",\n                \"title\" : \"A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-27776\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27533\",\n                \"title\" : \"A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \\\"telnet options\\\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27533\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27534\",\n                \"title\" : \"A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-27534\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28322\",\n                \"title\" : \"An information disclosure vulnerability exists in curl \u003cv8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-28322\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38546\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-38546\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-35252\",\n                \"title\" : \"When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\\\"sister site\\\" to deny service to all siblings.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.1,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2022-35252\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-32207\",\n                \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2022-32207\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-32207\",\n                \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2022-32207\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-22576\",\n                \"title\" : \"An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-22576\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38545\",\n                \"title\" : \"This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\\nhandshake.\\n\\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\\nthat to resolve the address instead of it getting done by curl itself, the\\nmaximum length that host name can be is 255 bytes.\\n\\nIf the host name is detected to be longer, curl switches to local name\\nresolving and instead passes on the resolved address only. Due to this bug,\\nthe local variable that means \\\"let the host resolve the name\\\" could get the\\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\\ncopy the too long host name to the target buffer instead of copying just the\\nresolved address there.\\n\\nThe target buffer being a heap based buffer, and the host name coming from the\\nURL that curl has been told to operate with.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-38545\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15079\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-15079\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27775\",\n                \"title\" : \"An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-27775\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27782\",\n                \"title\" : \"libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-27782\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-2398\",\n                \"title\" : \"HTTP/2 push headers memory-leak\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2398\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-13034\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-13034\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14819\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14819\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-1965\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-1965\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32206\",\n                \"title\" : \"curl \u003c 7.84.0 supports \\\"chained\\\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \\\"malloc bomb\\\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32206\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-23916\",\n                \"title\" : \"An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \\\"chained\\\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \\\"links\\\" in this \\\"decompression chain\\\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \\\"malloc bomb\\\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-23916\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14524\",\n                \"title\" : \"bearer token leak on cross-protocol redirect\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14524\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-3784\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-3784\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-3805\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-3805\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-43552\",\n                \"title\" : \"A use after free vulnerability exists in curl \u003c7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-43552\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27535\",\n                \"title\" : \"An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27535\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27536\",\n                \"title\" : \"An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27536\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28321\",\n                \"title\" : \"An improper certificate validation vulnerability exists in curl \u003cv8.1.0 in the way it supports matching of wildcard patterns when listed as \\\"Subject Alternative Name\\\" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-28321\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-10966\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-10966\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-3783\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-3783\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27538\",\n                \"title\" : \"An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27538\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32208\",\n                \"title\" : \"When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32208\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-46218\",\n                \"title\" : \"This flaw allows a malicious HTTP server to set \\\"super cookies\\\" in curl that\\nare then passed back to more origins than what is otherwise allowed or\\npossible. This allows a site to set cookies that then would get sent to\\ndifferent and unrelated sites and domains.\\n\\nIt could do this by exploiting a mixed case flaw in curl's function that\\nverifies a given cookie domain against the Public Suffix List (PSL). For\\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-46218\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9086\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9086\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27774\",\n                \"title\" : \"An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-27774\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-32221\",\n                \"title\" : \"When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-32221\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-10148\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-10148\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14017\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14017\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15224\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15224\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-27776\",\n                \"title\" : \"A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-27776\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27533\",\n                \"title\" : \"A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \\\"telnet options\\\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-27533\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-27534\",\n                \"title\" : \"A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-27534\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28322\",\n                \"title\" : \"An information disclosure vulnerability exists in curl \u003cv8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-28322\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-38546\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-38546\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-35252\",\n                \"title\" : \"When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\\\"sister site\\\" to deny service to all siblings.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.1,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2022-35252\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-32207\",\n                \"title\" : \"When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.8,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2022-32207\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-40896\",\n                \"title\" : \"In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \\\"checked\\\"). This makes classic XXE attacks possible.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.1,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-40896\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-49794\",\n                \"title\" : \"Libxml: heap use after free (uaf) leads to denial of service (dos)\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.1,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-49794\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-49796\",\n                \"title\" : \"Libxml: type confusion leads to denial of service (dos)\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.1,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2025-49796\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-56171\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-56171\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-40304\",\n                \"title\" : \"An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-40304\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-24928\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-24928\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-7425\",\n                \"title\" : \"Libxslt: heap use-after-free in libxslt caused by atype corruption in xmlattrptr\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-7425\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-40303\",\n                \"title\" : \"An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-40303\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-25062\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-25062\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32415\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-32415\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-49795\",\n                \"title\" : \"Libxml: null pointer dereference leads to denial of service (dos)\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-49795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6021\",\n                \"title\" : \"Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6021\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-7424\",\n                \"title\" : \"Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-7424\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29824\",\n                \"title\" : \"In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-29824\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-39615\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-39615\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9714\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9714\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-49043\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-49043\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-28484\",\n                \"title\" : \"In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-28484\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-29469\",\n                \"title\" : \"An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the '\\\\0' value).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-29469\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32414\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-32414\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6170\",\n                \"title\" : \"Libxml2: stack buffer overflow in xmllint interactive shell command handling\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 2.5,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2025-6170\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-40896\",\n                \"title\" : \"In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \\\"checked\\\"). This makes classic XXE attacks possible.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.1,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-40896\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-42898\",\n                \"title\" : \"PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \\\"a similar bug.\\\"\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-42898\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-39975\",\n                \"title\" : \"kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-39975\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26462\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-26462\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37370\",\n                \"title\" : \"In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-37370\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2020-17049\",\n                \"title\" : \"Kerberos KDC Security Feature Bypass Vulnerability\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2020-17049\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-36054\",\n                \"title\" : \"lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-36054\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-37371\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-37371\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-24528\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-24528\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26458\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26458\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-26461\",\n                \"title\" : \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-26461\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3576\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-3576\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-3596\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 9.0,\n                \"severity\" : \"CRITICAL\",\n                \"cves\" : [ \"CVE-2024-3596\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1271\",\n                \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1271\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-31115\",\n                \"title\" : \"XZ has a heap-use-after-free bug in threaded .xz decoder\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-31115\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1271\",\n                \"title\" : \"An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1271\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libksba@1.3.5-9.el8_7?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libksba-1.3.5-9.el8_7.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3515\",\n                \"title\" : \"A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3515\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-47629\",\n                \"title\" : \"Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-47629\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3515\",\n                \"title\" : \"A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-3515\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2026-24882\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-24882\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-68973\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-68973\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-34903\",\n                \"title\" : \"GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-34903\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2026-24882\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-24882\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-37434\",\n                \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-37434\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-5318\",\n                \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5318\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5987\",\n                \"title\" : \"Libssh: invalid return code for chacha20 poly1305 with openssl backend\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5987\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-48795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-48795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2283\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2283\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6004\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6004\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1667\",\n                \"title\" : \"A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1667\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6918\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-6918\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-5318\",\n                \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5318\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-5318\",\n                \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5318\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5987\",\n                \"title\" : \"Libssh: invalid return code for chacha20 poly1305 with openssl backend\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5987\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-48795\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-48795\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2283\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-2283\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6004\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-6004\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-1667\",\n                \"title\" : \"A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-1667\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-6918\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.7,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-6918\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-5318\",\n                \"title\" : \"Libssh: out-of-bounds read in sftp_handle()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5318\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2602\",\n                \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.3,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-2602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-5914\",\n                \"title\" : \"Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5914\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-4111\",\n                \"title\" : \"Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-4111\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-4424\",\n                \"title\" : \"Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-4424\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-5121\",\n                \"title\" : \"Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-5121\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-26280\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-26280\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-36227\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-36227\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-57970\",\n                \"title\" : \"libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-57970\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-25724\",\n                \"title\" : \"list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-25724\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-5914\",\n                \"title\" : \"Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-5914\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-13601\",\n                \"title\" : \"Glib: integer overflow in in g_escape_uri_string()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-13601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-52533\",\n                \"title\" : \"gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\\\\0' character.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-52533\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-32611\",\n                \"title\" : \"G_variant_byteswap() can take a long time with some non-normal inputs\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-32611\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-32665\",\n                \"title\" : \"Gvariant deserialisation does not match spec for non-normal data\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-32665\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14512\",\n                \"title\" : \"Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14512\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-29499\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-29499\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14087\",\n                \"title\" : \"Glib: glib: buffer underflow in gvariant parser leads to heap corruption\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14087\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4373\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-4373\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-34397\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.8,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2024-34397\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-13601\",\n                \"title\" : \"Glib: integer overflow in in g_escape_uri_string()\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-13601\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-6965\",\n                \"title\" : \"Integer Truncation on SQLite\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6965\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-7104\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-7104\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-3277\",\n                \"title\" : \"An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.3,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-3277\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-35737\",\n                \"title\" : \"SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-35737\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-6965\",\n                \"title\" : \"Integer Truncation on SQLite\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.7,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6965\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-33928\",\n                \"title\" : \"Buffer overflow vulnerability in function pool_installable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-33928\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-33929\",\n                \"title\" : \"Buffer overflow vulnerability in function pool_disabled_solvable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-33929\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-33930\",\n                \"title\" : \"Buffer overflow vulnerability in function pool_installable_whatprovides in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-33930\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-33938\",\n                \"title\" : \"Buffer overflow vulnerability in function prune_to_recommended in src/policy.c in libsolv before 0.7.17 allows attackers to cause a Denial of Service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-33938\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-46877\",\n                \"title\" : \"jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-46877\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28863\",\n                \"title\" : \"node-tar vulnerable to denial of service while parsing a tar file due to lack of folders count validation\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-28863\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-44568\",\n                \"title\" : \"Two heap-overflow vulnerabilities exist in openSUSE/libsolv libsolv through 13 Dec 2020 in the decisionmap variable via the resolve_dependencies function at src/solver.c (line 1940 \u0026 line 1995), which could cause a remote Denial of Service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-44568\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-3200\",\n                \"title\" : \"Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.3,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2021-3200\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-33928\",\n                \"title\" : \"Buffer overflow vulnerability in function pool_installable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-33928\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-6176\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6176\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-6176\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-6176\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-2509\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-2509\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0553\",\n                \"title\" : \"Gnutls: incomplete fix for cve-2023-5981\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-0553\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-0567\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-0567\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-0361\",\n                \"title\" : \"A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.4,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-0361\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32988\",\n                \"title\" : \"Gnutls: vulnerability in gnutls othername san export\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-32988\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32990\",\n                \"title\" : \"Gnutls: vulnerability in gnutls certtool template parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-32990\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-6395\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-6395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-5981\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-5981\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12243\",\n                \"title\" : \"Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-12243\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28834\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-28834\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-14831\",\n                \"title\" : \"Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14831\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-32989\",\n                \"title\" : \"Gnutls: vulnerability in gnutls sct extension parsing\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-32989\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28835\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-28835\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-9820\",\n                \"title\" : \"Gnutls: stack-based buffer overflow in gnutls_pkcs11_token_init() function\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-9820\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-2509\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-2509\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-44487\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-44487\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-27135\",\n                \"title\" : \"nghttp2 Denial of service: Assertion failure due to the missing state validation\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-27135\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-28182\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-28182\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-44487\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-44487\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-2953\",\n                \"title\" : \"A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2953\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-2953\",\n                \"title\" : \"A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2953\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-44964\",\n                \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-44964\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-33099\",\n                \"title\" : \"An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-33099\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-28805\",\n                \"title\" : \"singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-28805\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-43519\",\n                \"title\" : \"Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43519\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-44964\",\n                \"title\" : \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2021-44964\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-35938\",\n                \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35938\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-35939\",\n                \"title\" : \"It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35939\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-35937\",\n                \"title\" : \"A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35937\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-35938\",\n                \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35938\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-35938\",\n                \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35938\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-35939\",\n                \"title\" : \"It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35939\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2021-35937\",\n                \"title\" : \"A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35937\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-35938\",\n                \"title\" : \"A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-35938\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-43618\",\n                \"title\" : \"GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-43618\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-27456\",\n                \"title\" : \"util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-27456\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2025-14104\",\n                \"title\" : \"Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-14104\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-12133\",\n                \"title\" : \"Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-12133\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2021-46848\",\n                \"title\" : \"GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2021-46848\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2236\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-2236\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2236\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-2236\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=systemd-239-82.el8_10.15.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-7008\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-7008\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-3821\",\n                \"title\" : \"An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3821\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-4415\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-4415\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-45873\",\n                \"title\" : \"systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-45873\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4598\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.7,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-4598\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-7008\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-7008\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1304\",\n                \"title\" : \"An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.8,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-1304\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/file-libs@5.33-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=file-5.33-27.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-48554\",\n                \"title\" : \"File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \\\"File\\\" is the name of an Open Source project.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-48554\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-48554\",\n                \"title\" : \"File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \\\"File\\\" is the name of an Open Source project.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-48554\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2025-15467\",\n              \"title\" : \"Stack buffer overflow in CMS (Auth)EnvelopedData parsing\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 9.8,\n              \"severity\" : \"CRITICAL\",\n              \"cves\" : [ \"CVE-2025-15467\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm\",\n            \"issues\" : [ {\n              \"id\" : \"CVE-2025-45582\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 5.6,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2025-45582\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2022-48303\",\n              \"title\" : \"GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 5.5,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2022-48303\" ],\n              \"unique\" : false\n            } ],\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-37434\",\n                \"title\" : \"zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-37434\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2018-25032\",\n                \"title\" : \"zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.2,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2018-25032\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2024-2961\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 8.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-2961\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm\",\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2024-2961\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 8.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-2961\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm\",\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2024-2961\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 8.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-2961\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm\",\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\r100 1002k    0  641k  100  360k   821k   462k --:--:-- --:--:-- --:--:-- 1282k\n\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2024-2961\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 8.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-2961\" ],\n              \"unique\" : false\n            }\n          }, {\n            \"ref\" : \"pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm\",\n            \"issues\" : [ {\n              \"id\" : \"CVE-2023-4641\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 4.7,\n              \"severity\" : \"MEDIUM\",\n              \"cves\" : [ \"CVE-2023-4641\" ],\n              \"unique\" : false\n            }, {\n              \"id\" : \"CVE-2024-56433\",\n              \"title\" : \"shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 3.6,\n              \"severity\" : \"LOW\",\n              \"cves\" : [ \"CVE-2024-56433\" ],\n              \"unique\" : false\n            } ],\n            \"transitive\" : [ {\n              \"ref\" : \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-15281\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-15281\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0861\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.1,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2026-0861\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4911\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-4911\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33599\",\n                \"title\" : \"nscd: Stack-based buffer overflow in netgroup cache\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.6,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-33599\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-4802\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.0,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-4802\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4527\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4527\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4806\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4806\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-4813\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.9,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2023-4813\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-5702\",\n                \"title\" : \"The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-5702\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-0395\",\n                \"title\" : \"When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.5,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-0395\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33600\",\n                \"title\" : \"nscd: Null pointer crashes after notfound response\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33600\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2026-0915\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 5.3,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2026-0915\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-8058\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.2,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2025-8058\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33601\",\n                \"title\" : \"nscd: netgroup cache may terminate daemon on memory allocation failure\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33601\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2024-33602\",\n                \"title\" : \"nscd: netgroup cache assumes NSS callback uses in-buffer strings\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.0,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2024-33602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2024-2961\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 8.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2024-2961\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2023-2602\",\n                \"title\" : \"A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 3.3,\n                \"severity\" : \"LOW\",\n                \"cves\" : [ \"CVE-2023-2602\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-2603\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-2603\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2025-69720\",\n                \"title\" : \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2025-69720\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-29458\",\n                \"title\" : \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-29458\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2023-29491\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.8,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2023-29491\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }, {\n                \"id\" : \"CVE-2022-1587\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1587\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-1586\",\n                \"title\" : \"An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 7.5,\n                \"severity\" : \"HIGH\",\n                \"cves\" : [ \"CVE-2022-1586\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2022-3715\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.6,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2022-3715\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2020-11023\",\n                \"title\" : \"Potential XSS vulnerability in jQuery\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 6.1,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2020-11023\" ],\n                \"unique\" : false\n              }\n            }, {\n              \"ref\" : \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\",\n              \"issues\" : [ {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              } ],\n              \"highestVulnerability\" : {\n                \"id\" : \"CVE-2019-12900\",\n                \"title\" : \"BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.\",\n                \"source\" : \"redhat-csaf\",\n                \"cvssScore\" : 4.4,\n                \"severity\" : \"MEDIUM\",\n                \"cves\" : [ \"CVE-2019-12900\" ],\n                \"unique\" : false\n              }\n            } ],\n            \"highestVulnerability\" : {\n              \"id\" : \"CVE-2024-2961\",\n              \"source\" : \"redhat-csaf\",\n              \"cvssScore\" : 8.8,\n              \"severity\" : \"HIGH\",\n              \"cves\" : [ \"CVE-2024-2961\" ],\n              \"unique\" : false\n            }\n          } ]\n        }\n      }\n    }\n  },\n  \"licenses\" : [ {\n    \"status\" : {\n      \"ok\" : false,\n      \"name\" : \"deps.dev\",\n      \"code\" : 400,\n      \"message\" : \"Bad Request: invalid purl \\\"pkg:maven/io.github.stuartwdouglas.hacbstest.Main/hacbs-test\\\" at request index 25\",\n      \"warnings\" : { }\n    },\n    \"summary\" : {\n      \"total\" : 1,\n      \"concluded\" : 119,\n      \"permissive\" : 1,\n      \"weakCopyleft\" : 0,\n      \"strongCopyleft\" : 0,\n      \"unknown\" : 0,\n      \"deprecated\" : 0,\n      \"osiApproved\" : 1,\n      \"fsfLibre\" : 1\n    },\n    \"packages\" : {\n      \"pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/p11-kit@0.23.22-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=p11-kit-0.23.22-2.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libxcrypt@4.1.1-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxcrypt-4.1.1-6.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/sed@4.5-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sed-4.5-5.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/filesystem@3.8-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=filesystem-3.8-6.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nettle-3.4.1-7.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libverto@0.3.2-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libverto-0.3.2-2.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gpg-pubkey@fd431d51-4ae0493b?distro=rhel-8.10\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gdbm-libs@1.18-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gdbm-1.18-2.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libunistring@0.9.9-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libunistring-0.9.9-3.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/platform-python@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/json-c@0.13.1-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=json-c-0.13.1-3.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libyaml@0.1.7-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libyaml-0.1.7-5.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libksba@1.3.5-9.el8_7?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libksba-1.3.5-9.el8_7.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/file-libs@5.33-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=file-5.33-27.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libacl@2.2.53-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=acl-2.2.53-3.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/p11-kit-trust@0.23.22-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=p11-kit-0.23.22-2.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libzstd@1.4.4-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zstd-1.4.4-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/langpacks-en@1.0-12.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=langpacks-1.0-12.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/keyutils-libs@1.5.10-9.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=keyutils-1.5.10-9.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:github/beatlabs/delete-old-branches-action@v0.0.10\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/findutils@4.6.0-24.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=findutils-4.6.0-24.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libattr@2.4.48-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=attr-2.4.48-3.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/npth@1.5-4.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=npth-1.5-4.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/librepo@1.14.2-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=librepo-1.14.2-5.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/dbus-libs@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/chkconfig@1.19.2-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=chkconfig-1.19.2-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/platform-python-setuptools@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/librhsm@0.0.3-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=librhsm-0.0.3-5.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/publicsuffix-list-dafsa@20180723-1.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=publicsuffix-list-20180723-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gpg-pubkey@d4082792-5b32db75?distro=rhel-8.10\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/readline@7.0-10.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=readline-7.0-10.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libdnf@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libusbx-1.0.23-4.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libsigsegv@2.11-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsigsegv-2.11-5.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/ca-certificates@2025.2.80_v9.0.304-80.2.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ca-certificates-2025.2.80_v9.0.304-80.2.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gawk@4.2.1-4.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gawk-4.2.1-4.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libnsl2@1.2.0-2.20180605git4a062cf.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libnsl2-1.2.0-2.20180605git4a062cf.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/basesystem@11-5.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=basesystem-11-5.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/popt@1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=popt-1.18-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libidn2@2.2.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libidn2-2.2.0-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/setup@2.12.2-9.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=setup-2.12.2-9.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/tzdata@2026a-1.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=tzdata-2026a-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=systemd-239-82.el8_10.15.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/grep@3.1-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=grep-3.1-6.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/mpfr@3.1.6-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=mpfr-3.1.6-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/redhat-release@8.10-0.3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=redhat-release-8.10-0.3.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libassuan@2.5.1-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libassuan-2.5.1-3.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/elfutils-libelf@0.190-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=elfutils-0.190-2.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/json-glib@1.4.4-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=json-glib-1.4.4-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gobject-introspection@1.56.1-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gobject-introspection-1.56.1-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libselinux@2.9-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libselinux-2.9-11.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libsepol@2.9-3.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsepol-2.9-3.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:github/actions/checkout@v4\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libgpg-error@1.31-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgpg-error-1.31-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/info@6.5-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=texinfo-6.5-7.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libdb-utils@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libpsl@0.20.2-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpsl-0.20.2-6.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/coreutils-single@8.30-17.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=coreutils-8.30-17.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libcap-ng@0.7.11-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-ng-0.7.11-1.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-6.el8_5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cyrus-sasl-2.1.27-6.el8_5.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/crypto-policies@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libffi@3.1-24.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libffi-3.1-24.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/pcre@8.42-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre-8.42-6.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/gdbm@1.18-2.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gdbm-1.18-2.el8.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/audit-libs@3.1.2-1.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=audit-3.1.2-1.el8_10.1.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:pypi/setuptools@39.2.0\" : {\n        \"concluded\" : {\n          \"identifiers\" : [ {\n            \"id\" : \"MIT\",\n            \"name\" : \"MIT License\",\n            \"isDeprecated\" : false,\n            \"isOsiApproved\" : true,\n            \"isFsfLibre\" : true,\n            \"category\" : \"PERMISSIVE\"\n          } ],\n          \"expression\" : \"MIT\",\n          \"name\" : \"MIT License\",\n          \"category\" : \"PERMISSIVE\",\n          \"source\" : \"deps.dev\",\n          \"sourceUrl\" : \"https://api.deps.dev\"\n        },\n        \"evidence\" : [ {\n          \"identifiers\" : [ {\n            \"id\" : \"MIT\",\n            \"name\" : \"MIT License\",\n            \"isDeprecated\" : false,\n            \"isOsiApproved\" : true,\n            \"isFsfLibre\" : true,\n            \"category\" : \"PERMISSIVE\"\n          } ],\n          \"expression\" : \"MIT\",\n          \"name\" : \"MIT License\",\n          \"category\" : \"PERMISSIVE\",\n          \"source\" : \"deps.dev\",\n          \"sourceUrl\" : \"https://api.deps.dev\"\n        } ]\n      },\n      \"pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      },\n      \"pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm\" : {\n        \"evidence\" : [ ]\n      }\n    }\n  } ]\n}\npod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-tpa-scan-pod | container step-oci-attach-report: \nUsing token for quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf\nAttaching tpa-report-amd64.json to quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf@sha256:ea8744c45dad74236e8bdd06f4f40711dd4ec5771ad5abcd3cd05e6fa0332408\n[retry] executing: oras attach --no-tty --format go-template=\\{\\{.digest\\}\\} --registry-config /tmp/auth/config.json --artifact-type application/vnd.redhat.tpa-report+json quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf@sha256:ea8744c45dad74236e8bdd06f4f40711dd4ec5771ad5abcd3cd05e6fa0332408 tpa-report-amd64.json:application/vnd.redhat.tpa-report+json\n\npod: test-comp-pac-forgejo-pbtckf-on-pull-request-tzdvc-tpa-scan-pod | container step-conftest-vulnerabilities: \n[\n\t{\n\t\t\"filename\": \"/tekton/home/tpa-report-amd64.json\",\n\t\t\"namespace\": \"required_checks\",\n\t\t\"successes\": 4,\n\t\t\"warnings\": [\n\t\t\t{\n\t\t\t\t\"msg\": \"Found 6 critical vulnerabilities.\",\n\t\t\t\t\"metadata\": {\n\t\t\t\t\t\"details\": {\n\t\t\t\t\t\t\"description\": \"Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-3596)\",\n\t\t\t\t\t\t\"name\": \"rhtpa_critical_vulnerabilities\",\n\t\t\t\t\t\t\"url\": \"https://access.redhat.com/articles/red_hat_vulnerability_tutorial\"\n\t\t\t\t\t},\n\t\t\t\t\t\"vulnerabilities_number\": 6\n\t\t\t\t}\n\t\t\t},\n\t\t\t{\n\t\t\t\t\"msg\": \"Found 115 high vulnerabilities.\",\n\t\t\t\t\"metadata\": {\n\t\t\t\t\t\"details\": {\n\t\t\t\t\t\t\"description\": \"Source: osv-github. Affected dependencies: pkg:pypi/setuptools@39.2.0 [direct] (CVE-2024-6345, CVE-2022-40897); Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [direct] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm [direct] (CVE-2023-2953), pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm [direct] (CVE-2026-21945, CVE-2025-64720, CVE-2025-65018), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/javapackages-filesystem@5.3.0-1.module%2Bel8%2B2447%2B6f56d9a6?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=javapackages-tools-5.3.0-1.module%2Bel8%2B2447%2B6f56d9a6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-48734, CVE-2019-10086), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/cups-libs@2.2.6-67.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=cups-2.2.6-67.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-58060, CVE-2024-47175, CVE-2023-34241), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-2509, CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/lua@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-44964), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-44964), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2025-15079, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-56171, CVE-2022-40304, CVE-2025-24928, CVE-2025-7425, CVE-2022-40303, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424, CVE-2022-29824), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-44964), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2025-15079, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-56171, CVE-2022-40304, CVE-2025-24928, CVE-2025-7425, CVE-2022-40303, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424, CVE-2022-29824), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/libksba@1.3.5-9.el8_7?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libksba-1.3.5-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-3515, CVE-2022-47629), pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-33928, CVE-2021-33929, CVE-2021-33930, CVE-2021-33938, CVE-2021-46877), pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-2509, CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-44964), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587)\",\n\t\t\t\t\t\t\"name\": \"rhtpa_high_vulnerabilities\",\n\t\t\t\t\t\t\"url\": \"https://access.redhat.com/articles/red_hat_vulnerability_tutorial\"\n\t\t\t\t\t},\n\t\t\t\t\t\"vulnerabilities_number\": 115\n\t\t\t\t}\n\t\t\t},\n\t\t\t{\n\t\t\t\t\"msg\": \"Found 178 medium vulnerabilities.\",\n\t\t\t\t\"metadata\": {\n\t\t\t\t\t\"details\": {\n\t\t\t\t\t\t\"description\": \"Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [direct] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm [direct] (CVE-2026-21933, CVE-2026-21925), pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [direct] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm [direct] (CVE-2025-45582, CVE-2022-48303), pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm [direct] (CVE-2023-4641), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-pip-9.0.3-24.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/cups-libs@2.2.6-67.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=cups-2.2.6-67.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-26691, CVE-2023-32360, CVE-2025-58364, CVE-2023-32324, CVE-2025-58436, CVE-2024-35235), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/lua@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/dbus-libs@1.12.8-27.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-42010, CVE-2022-42011, CVE-2022-42012, CVE-2023-34969), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/avahi-libs@0.7-27.el8_10.1?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=avahi-0.7-27.el8_10.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-3468, CVE-2023-1981, CVE-2023-38469, CVE-2023-38470, CVE-2023-38471, CVE-2023-38472, CVE-2023-38473, CVE-2021-3502, CVE-2024-52615, CVE-2024-52616), pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=systemd-239-82.el8_10.15.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=python-pip-9.0.3-24.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/alsa-lib@1.2.10-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=alsa-lib-1.2.10-2.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2026-25068), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-13034, CVE-2025-14819, CVE-2026-1965, CVE-2022-32206, CVE-2023-23916, CVE-2025-14524, CVE-2026-3784, CVE-2026-3805, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2025-10966, CVE-2026-3783, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2025-10148, CVE-2025-14017, CVE-2025-15224, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-26280, CVE-2022-36227, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-13034, CVE-2025-14819, CVE-2026-1965, CVE-2022-32206, CVE-2023-23916, CVE-2025-14524, CVE-2026-3784, CVE-2026-3805, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2025-10966, CVE-2026-3783, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2025-10148, CVE-2025-14017, CVE-2025-15224, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-34903), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libarchive@3.3.3-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libarchive-3.3.3-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-26280, CVE-2022-36227, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-28863, CVE-2021-44568), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=systemd-239-82.el8_10.15.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/file-libs@5.33-27.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=file-5.33-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-12.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsemanage-2.9-12.el8_10.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2019-12900)\",\n\t\t\t\t\t\t\"name\": \"rhtpa_medium_vulnerabilities\",\n\t\t\t\t\t\t\"url\": \"https://access.redhat.com/articles/red_hat_vulnerability_tutorial\"\n\t\t\t\t\t},\n\t\t\t\t\t\"vulnerabilities_number\": 178\n\t\t\t\t}\n\t\t\t},\n\t\t\t{\n\t\t\t\t\"msg\": \"Found 14 low vulnerabilities.\",\n\t\t\t\t\"metadata\": {\n\t\t\t\t\t\"details\": {\n\t\t\t\t\t\t\"description\": \"Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [direct] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm [direct] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.18.0.8-1.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=java-17-openjdk-17.0.18.0.8-1.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-6170), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=1\\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-6170), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-34397), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-3200), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\\u0026distro=rhel-8.10\\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\\u0026distro=rhel-8.10\\u0026epoch=2\\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm] (CVE-2023-2602)\",\n\t\t\t\t\t\t\"name\": \"rhtpa_low_vulnerabilities\",\n\t\t\t\t\t\t\"url\": \"https://access.redhat.com/articles/red_hat_vulnerability_tutorial\"\n\t\t\t\t\t},\n\t\t\t\t\t\"vulnerabilities_number\": 14\n\t\t\t\t}\n\t\t\t}\n\t\t]\n\t}\n]\n{\"vulnerabilities\":{\"critical\":6,\"high\":115,\"medium\":178,\"low\":14,\"unknown\":0},\"unpatched_vulnerabilities\":{\"critical\":0,\"high\":0,\"medium\":0,\"low\":0,\"unknown\":0}}\n{\"image\": {\"pullspec\": \"quay.io/redhat-appstudio-qe/forgejo-rep-xjws/test-comp-pac-forgejo-pbtckf:on-pr-ebd2ecfcc5194afc0e9f78f82c9088ad795372ef\", \"digests\": [\"sha256:ea8744c45dad74236e8bdd06f4f40711dd4ec5771ad5abcd3cd05e6fa0332408\"]}}\n{\"result\":\"SUCCESS\",\"timestamp\":\"2026-04-20T17:46:39+00:00\",\"note\":\"Task tpa-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by TPA.\",\"namespace\":\"default\",\"successes\":0,\"failures\":0,\"warnings\":0}\n",
        "SpecEvents": [
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 214
            },
            "TimelineLocation": {
              "Order": 19,
              "Time": "2026-04-20T17:31:11.737278413Z"
            },
            "Message": "should lead to build PipelineRun finishing successfully",
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 214
            },
            "TimelineLocation": {
              "Offset": 1557853,
              "Order": 21,
              "Time": "2026-04-20T17:49:56.430423168Z"
            },
            "Message": "should lead to build PipelineRun finishing successfully",
            "Duration": 1124693144755,
            "NodeType": "It"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 105
            },
            "TimelineLocation": {
              "Offset": 1557853,
              "Order": 22,
              "Time": "2026-04-20T17:49:56.430740017Z"
            },
            "Message": "Forgejo with status reporting of Integration tests in the associated merge request",
            "NodeType": "AfterAll"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 105
            },
            "TimelineLocation": {
              "Offset": 1557853,
              "Order": 24,
              "Time": "2026-04-20T17:49:58.733804785Z"
            },
            "Message": "Forgejo with status reporting of Integration tests in the associated merge request",
            "Duration": 2303064759,
            "NodeType": "AfterAll"
          },
          {
            "SpecEventType": "Node",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 41
            },
            "TimelineLocation": {
              "Offset": 1557853,
              "Order": 25,
              "Time": "2026-04-20T17:49:58.733956939Z"
            },
            "Message": "[integration-service-suite Forgejo Status Reporting of Integration tests]",
            "NodeType": "AfterEach"
          },
          {
            "SpecEventType": "Node (End)",
            "CodeLocation": {
              "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
              "LineNumber": 41
            },
            "TimelineLocation": {
              "Offset": 1557853,
              "Order": 27,
              "Time": "2026-04-20T17:49:58.889467288Z"
            },
            "Message": "[integration-service-suite Forgejo Status Reporting of Integration tests]",
            "Duration": 155510339,
            "NodeType": "AfterEach"
          }
        ]
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Forgejo Status Reporting of Integration tests]",
          "Forgejo with status reporting of Integration tests in the associated merge request",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 43
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 127
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "forgejo-status-reporting"
          ],
          null,
          [
            "custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
          "LineNumber": 219
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should have a related PaC init MR created",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.911390157Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 219
          },
          "TimelineLocation": {
            "Offset": 1557853,
            "Order": 28,
            "Time": "2026-04-20T17:49:58.911385817Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 219
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Forgejo Status Reporting of Integration tests]",
          "Forgejo with status reporting of Integration tests in the associated merge request",
          "when a new Component with specified custom branch is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 43
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 127
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "forgejo-status-reporting"
          ],
          null,
          [
            "custom-branch"
          ]
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
          "LineNumber": 239
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "the PipelineRun should eventually finish successfully for component ",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.911673484Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 239
          },
          "TimelineLocation": {
            "Offset": 1557853,
            "Order": 29,
            "Time": "2026-04-20T17:49:58.911672014Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 239
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Forgejo Status Reporting of Integration tests]",
          "Forgejo with status reporting of Integration tests in the associated merge request",
          "when the PaC build pipelineRun run succeeded"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 43
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 245
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "forgejo-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
          "LineNumber": 246
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "checks if the BuildPipelineRun has the annotation of chains signed",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.911896719Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 246
          },
          "TimelineLocation": {
            "Offset": 1557853,
            "Order": 30,
            "Time": "2026-04-20T17:49:58.911895539Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 246
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Forgejo Status Reporting of Integration tests]",
          "Forgejo with status reporting of Integration tests in the associated merge request",
          "when the PaC build pipelineRun run succeeded"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 43
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 245
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "forgejo-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
          "LineNumber": 250
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "checks if the Snapshot is created",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.912139605Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 250
          },
          "TimelineLocation": {
            "Offset": 1557853,
            "Order": 31,
            "Time": "2026-04-20T17:49:58.912138356Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 250
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Forgejo Status Reporting of Integration tests]",
          "Forgejo with status reporting of Integration tests in the associated merge request",
          "when the PaC build pipelineRun run succeeded"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 43
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 245
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "forgejo-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
          "LineNumber": 255
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "checks if the Build PipelineRun got annotated with Snapshot name",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.912349241Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 255
          },
          "TimelineLocation": {
            "Offset": 1557853,
            "Order": 32,
            "Time": "2026-04-20T17:49:58.912348051Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 255
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Forgejo Status Reporting of Integration tests]",
          "Forgejo with status reporting of Integration tests in the associated merge request",
          "when the Snapshot was created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 43
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 260
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "forgejo-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
          "LineNumber": 261
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should find the Integration Test Scenario PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.912565276Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 261
          },
          "TimelineLocation": {
            "Offset": 1557853,
            "Order": 33,
            "Time": "2026-04-20T17:49:58.912564056Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 261
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Forgejo Status Reporting of Integration tests]",
          "Forgejo with status reporting of Integration tests in the associated merge request",
          "when Integration PipelineRun is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 43
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 269
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "forgejo-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
          "LineNumber": 270
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should eventually complete successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.912787102Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 270
          },
          "TimelineLocation": {
            "Offset": 1557853,
            "Order": 34,
            "Time": "2026-04-20T17:49:58.912786012Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 270
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Forgejo Status Reporting of Integration tests]",
          "Forgejo with status reporting of Integration tests in the associated merge request",
          "when Integration PipelineRun is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 43
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 269
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "forgejo-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
          "LineNumber": 275
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to the integration test PipelineRun's Pass status reported at MR commit status",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.913024338Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 275
          },
          "TimelineLocation": {
            "Offset": 1557853,
            "Order": 35,
            "Time": "2026-04-20T17:49:58.913023088Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 275
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Forgejo Status Reporting of Integration tests]",
          "Forgejo with status reporting of Integration tests in the associated merge request",
          "when Integration PipelineRun is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 43
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 269
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "forgejo-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
          "LineNumber": 281
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "validates at least one MR comment contains the final integration test result",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.913259184Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 281
          },
          "TimelineLocation": {
            "Offset": 1557853,
            "Order": 36,
            "Time": "2026-04-20T17:49:58.913258084Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 281
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Forgejo Status Reporting of Integration tests]",
          "Forgejo with status reporting of Integration tests in the associated merge request",
          "when Integration PipelineRun is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 43
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 269
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "forgejo-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
          "LineNumber": 310
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "merging the PR should be successful",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.913464399Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 310
          },
          "TimelineLocation": {
            "Offset": 1557853,
            "Order": 37,
            "Time": "2026-04-20T17:49:58.913463189Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 310
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Forgejo Status Reporting of Integration tests]",
          "Forgejo with status reporting of Integration tests in the associated merge request",
          "when Integration PipelineRun is created"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 43
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 269
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "forgejo-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
          "LineNumber": 325
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "leads to triggering a push PipelineRun",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.913663114Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 325
          },
          "TimelineLocation": {
            "Offset": 1557853,
            "Order": 38,
            "Time": "2026-04-20T17:49:58.913662054Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 325
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Forgejo Status Reporting of Integration tests]",
          "Forgejo with status reporting of Integration tests in the associated merge request",
          "when Run integration tests after Merged MR"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 43
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 341
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "forgejo-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
          "LineNumber": 342
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "should eventually complete successfully",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.913865909Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 342
          },
          "TimelineLocation": {
            "Offset": 1557853,
            "Order": 39,
            "Time": "2026-04-20T17:49:58.913864849Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 342
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      },
      {
        "ContainerHierarchyTexts": [
          "[integration-service-suite Forgejo Status Reporting of Integration tests]",
          "Forgejo with status reporting of Integration tests in the associated merge request",
          "when Run integration tests after Merged MR"
        ],
        "ContainerHierarchyLocations": [
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/pkg/framework/describe.go",
            "LineNumber": 25
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 43
          },
          {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 341
          }
        ],
        "ContainerHierarchyLabels": [
          [
            "integration-service",
            "forgejo-status-reporting"
          ],
          null,
          null
        ],
        "ContainerHierarchySemVerConstraints": [
          null,
          null,
          null
        ],
        "LeafNodeType": "It",
        "LeafNodeLocation": {
          "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
          "LineNumber": 347
        },
        "LeafNodeLabels": null,
        "LeafNodeSemVerConstraints": null,
        "LeafNodeText": "eventually leads to the integration test PipelineRun's Pass status reported at MR commit status",
        "State": "skipped",
        "StartTime": "2026-04-20T17:49:58.914108566Z",
        "EndTime": "0001-01-01T00:00:00Z",
        "RunTime": 0,
        "ParallelProcess": 15,
        "Failure": {
          "Message": "Spec skipped because an earlier spec in an ordered container failed",
          "Location": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 347
          },
          "TimelineLocation": {
            "Offset": 1557853,
            "Order": 40,
            "Time": "2026-04-20T17:49:58.914107276Z"
          },
          "FailureNodeContext": "leaf-node",
          "FailureNodeType": "It",
          "FailureNodeLocation": {
            "FileName": "/tmp/tmp.QShu3Ly5GU/tests/integration-service/forgejo-integration-reporting.go",
            "LineNumber": 347
          },
          "ProgressReport": {
            "LeafNodeLocation": {},
            "SpecStartTime": "0001-01-01T00:00:00Z",
            "CurrentNodeLocation": {},
            "CurrentNodeStartTime": "0001-01-01T00:00:00Z",
            "CurrentStepLocation": {},
            "CurrentStepStartTime": "0001-01-01T00:00:00Z",
            "TimelineLocation": {
              "Time": "0001-01-01T00:00:00Z"
            }
          }
        },
        "NumAttempts": 0,
        "MaxFlakeAttempts": 0,
        "MaxMustPassRepeatedly": 0
      }
    ]
  }
]
