[ { "filename": "/tekton/home/tpa-report-amd64.json", "namespace": "required_checks", "successes": 4, "warnings": [ { "msg": "Found 4 critical vulnerabilities.", "metadata": { "details": { "description": "Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm [direct] (CVE-2025-15467), pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-12.el9_6?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libxml2-2.9.13-12.el9_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2025-15467)", "name": "rhtpa_critical_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 4 } }, { "msg": "Found 27 high vulnerabilities.", "metadata": { "details": { "description": "Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm [direct] (CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [direct] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.8.3-6.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnutls-3.8.3-6.el9_6.2.src.rpm [direct] (CVE-2026-1584, CVE-2026-33845, CVE-2026-33846), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-10.20210508.el9_6.2?arch=noarch\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-12.el9_6?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libxml2-2.9.13-12.el9_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/gnupg2@2.3.3-4.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnupg2-2.3.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/libarchive@3.5.3-6.el9_6?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libarchive-3.5.3-6.el9_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-base@6.2-10.20210508.el9_6.2?arch=noarch\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/glib2@2.68.4-16.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glib2-2.68.4-16.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.34.1-8.el9_6?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=sqlite-3.34.1-8.el9_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-6965, CVE-2025-3277), pkg:rpm/redhat/gnutls@3.8.3-6.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnutls-3.8.3-6.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-1584, CVE-2026-33845, CVE-2026-33846), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libnghttp2@1.43.0-6.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=nghttp2-1.43.0-6.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-27135), pkg:rpm/redhat/libgcrypt@1.10.0-11.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libgcrypt-1.10.0-11.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm] (CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-10.20210508.el9_6.2?arch=noarch\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/libgcrypt@1.10.0-11.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libgcrypt-1.10.0-11.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-10.20210508.el9_6.2?arch=noarch\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-10.20210508.el9_6.2?arch=noarch\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/libgcrypt@1.10.0-11.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libgcrypt-1.10.0-11.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libksba@1.5.1-7.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libksba-1.5.1-7.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libksba@1.5.1-7.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libksba-1.5.1-7.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libksba@1.5.1-7.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libksba-1.5.1-7.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/ncurses-base@6.2-10.20210508.el9_6.2?arch=noarch\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/libksba@1.5.1-7.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libksba-1.5.1-7.el9.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/libksba@1.5.1-7.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libksba-1.5.1-7.el9.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libzstd@1.5.5-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=zstd-1.5.5-1.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libzstd@1.5.5-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=zstd-1.5.5-1.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libzstd@1.5.5-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=zstd-1.5.5-1.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/ncurses-base@6.2-10.20210508.el9_6.2?arch=noarch\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/libzstd@1.5.5-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=zstd-1.5.5-1.el9.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/libzstd@1.5.5-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=zstd-1.5.5-1.el9.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-34.el9?arch=noarch\u0026distro=rhel-9.6\u0026upstream=rootfiles-8.1-34.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-34.el9?arch=noarch\u0026distro=rhel-9.6\u0026upstream=rootfiles-8.1-34.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-34.el9?arch=noarch\u0026distro=rhel-9.6\u0026upstream=rootfiles-8.1-34.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/ncurses-base@6.2-10.20210508.el9_6.2?arch=noarch\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-34.el9?arch=noarch\u0026distro=rhel-9.6\u0026upstream=rootfiles-8.1-34.el9.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-34.el9?arch=noarch\u0026distro=rhel-9.6\u0026upstream=rootfiles-8.1-34.el9.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/bzip2-libs@1.0.8-10.el9_5?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=bzip2-1.0.8-10.el9_5.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/bzip2-libs@1.0.8-10.el9_5?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=bzip2-1.0.8-10.el9_5.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/bzip2-libs@1.0.8-10.el9_5?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=bzip2-1.0.8-10.el9_5.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/ncurses-base@6.2-10.20210508.el9_6.2?arch=noarch\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/bzip2-libs@1.0.8-10.el9_5?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=bzip2-1.0.8-10.el9_5.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/bzip2-libs@1.0.8-10.el9_5?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=bzip2-1.0.8-10.el9_5.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libblkid@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libblkid@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libblkid@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/ncurses-base@6.2-10.20210508.el9_6.2?arch=noarch\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/libblkid@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/libblkid@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/ncurses-base@6.2-10.20210508.el9_6.2?arch=noarch\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/gnutls@3.8.3-6.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnutls-3.8.3-6.el9_6.2.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/gnutls@3.8.3-6.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnutls-3.8.3-6.el9_6.2.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/gnutls@3.8.3-6.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnutls-3.8.3-6.el9_6.2.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/ncurses-base@6.2-10.20210508.el9_6.2?arch=noarch\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/gnutls@3.8.3-6.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnutls-3.8.3-6.el9_6.2.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/gnutls@3.8.3-6.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnutls-3.8.3-6.el9_6.2.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libsemanage@3.6-5.el9_6?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libsemanage-3.6-5.el9_6.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libsemanage@3.6-5.el9_6?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libsemanage-3.6-5.el9_6.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libsemanage@3.6-5.el9_6?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libsemanage-3.6-5.el9_6.src.rpm] (CVE-2026-0861), pkg:rpm/redhat/ncurses-base@6.2-10.20210508.el9_6.2?arch=noarch\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/libsemanage@3.6-5.el9_6?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libsemanage-3.6-5.el9_6.src.rpm] (CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/libsemanage@3.6-5.el9_6?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libsemanage-3.6-5.el9_6.src.rpm] (CVE-2025-69720)", "name": "rhtpa_high_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 27 } }, { "msg": "Found 52 medium vulnerabilities.", "metadata": { "details": { "description": "Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm [direct] (CVE-2025-69421, CVE-2025-11187, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2025-9230, CVE-2025-15469, CVE-2026-22795, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm [direct] (CVE-2025-4598), pkg:rpm/redhat/libblkid@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm [direct] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/gnutls@3.8.3-6.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnutls-3.8.3-6.el9_6.2.src.rpm [direct] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2026-3833, CVE-2025-14831, CVE-2025-32989, CVE-2025-9820), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm] (CVE-2026-4437, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/libcap@2.48-9.el9_2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libcap-2.48-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libtasn1@4.16.0-9.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libtasn1-4.16.0-9.el9.src.rpm [transitive via pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm] (CVE-2025-13151), pkg:rpm/redhat/p11-kit@0.25.3-3.el9_5?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=p11-kit-0.25.3-3.el9_5.src.rpm [transitive via pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-69421, CVE-2025-11187, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2025-9230, CVE-2025-15469, CVE-2026-22795, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-12.el9_6?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libxml2-2.9.13-12.el9_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/gnupg2@2.3.3-4.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnupg2-2.3.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-68972), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-4437, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/libarchive@3.5.3-6.el9_6?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libarchive-3.5.3-6.el9_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-4426, CVE-2025-60753, CVE-2026-5745, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/glib2@2.68.4-16.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glib2-2.68.4-16.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-14512, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.8.3-6.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnutls-3.8.3-6.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2026-3833, CVE-2025-14831, CVE-2025-32989, CVE-2025-9820), pkg:rpm/redhat/libcap@2.48-9.el9_2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libcap-2.48-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libblkid@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libsmartcols@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libuuid@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-9.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libtasn1-4.16.0-9.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-13151), pkg:rpm/redhat/krb5-libs@1.21.1-8.el9_6?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=krb5-1.21.1-8.el9_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-3576), pkg:rpm/redhat/p11-kit@0.25.3-3.el9_5?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=p11-kit-0.25.3-3.el9_5.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/curl-minimal@7.76.1-31.el9_6.1?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=curl-7.76.1-31.el9_6.1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-9086), pkg:rpm/redhat/libcurl-minimal@7.76.1-31.el9_6.1?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=curl-7.76.1-31.el9_6.1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-9086), pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm] (CVE-2025-69421, CVE-2025-11187, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2025-9230, CVE-2025-15469, CVE-2026-22795, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm] (CVE-2026-4437, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/libcap@2.48-9.el9_2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libcap-2.48-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libtasn1@4.16.0-9.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libtasn1-4.16.0-9.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm] (CVE-2025-13151), pkg:rpm/redhat/p11-kit@0.25.3-3.el9_5?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=p11-kit-0.25.3-3.el9_5.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-69421, CVE-2025-11187, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2025-9230, CVE-2025-15469, CVE-2026-22795, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2026-4437, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/libcap@2.48-9.el9_2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libcap-2.48-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/krb5-libs@1.21.1-8.el9_6?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=krb5-1.21.1-8.el9_6.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-3576), pkg:rpm/redhat/libtasn1@4.16.0-9.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libtasn1-4.16.0-9.el9.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2025-13151), pkg:rpm/redhat/p11-kit@0.25.3-3.el9_5?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=p11-kit-0.25.3-3.el9_5.src.rpm [transitive via pkg:rpm/redhat/cyrus-sasl-lib@2.1.27-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=cyrus-sasl-2.1.27-21.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=1\u0026upstream=openssl-3.2.2-6.el9_5.1.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2025-69421, CVE-2025-11187, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2025-9230, CVE-2025-15469, CVE-2026-22795, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2026-4437, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/libcap@2.48-9.el9_2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libcap-2.48-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libtasn1@4.16.0-9.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libtasn1-4.16.0-9.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2025-13151), pkg:rpm/redhat/p11-kit@0.25.3-3.el9_5?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=p11-kit-0.25.3-3.el9_5.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2025-4598), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libksba@1.5.1-7.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libksba-1.5.1-7.el9.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libksba@1.5.1-7.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libksba-1.5.1-7.el9.src.rpm] (CVE-2026-4437, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libksba@1.5.1-7.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libksba-1.5.1-7.el9.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libzstd@1.5.5-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=zstd-1.5.5-1.el9.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libzstd@1.5.5-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=zstd-1.5.5-1.el9.src.rpm] (CVE-2026-4437, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libzstd@1.5.5-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=zstd-1.5.5-1.el9.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-34.el9?arch=noarch\u0026distro=rhel-9.6\u0026upstream=rootfiles-8.1-34.el9.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-34.el9?arch=noarch\u0026distro=rhel-9.6\u0026upstream=rootfiles-8.1-34.el9.src.rpm] (CVE-2026-4437, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-34.el9?arch=noarch\u0026distro=rhel-9.6\u0026upstream=rootfiles-8.1-34.el9.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/bzip2-libs@1.0.8-10.el9_5?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=bzip2-1.0.8-10.el9_5.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/bzip2-libs@1.0.8-10.el9_5?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=bzip2-1.0.8-10.el9_5.src.rpm] (CVE-2026-4437, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/bzip2-libs@1.0.8-10.el9_5?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=bzip2-1.0.8-10.el9_5.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libblkid@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libblkid@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm] (CVE-2026-4437, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libblkid@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/libcap@2.48-9.el9_2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libcap-2.48-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/libblkid@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libuuid@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm [transitive via pkg:rpm/redhat/libblkid@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2026-4437, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/gnutls@3.8.3-6.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnutls-3.8.3-6.el9_6.2.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/gnutls@3.8.3-6.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnutls-3.8.3-6.el9_6.2.src.rpm] (CVE-2026-4437, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/gnutls@3.8.3-6.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnutls-3.8.3-6.el9_6.2.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/libtasn1@4.16.0-9.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libtasn1-4.16.0-9.el9.src.rpm [transitive via pkg:rpm/redhat/gnutls@3.8.3-6.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnutls-3.8.3-6.el9_6.2.src.rpm] (CVE-2025-13151), pkg:rpm/redhat/p11-kit@0.25.3-3.el9_5?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=p11-kit-0.25.3-3.el9_5.src.rpm [transitive via pkg:rpm/redhat/gnutls@3.8.3-6.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnutls-3.8.3-6.el9_6.2.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libsemanage@3.6-5.el9_6?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libsemanage-3.6-5.el9_6.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058), pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libsemanage@3.6-5.el9_6?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libsemanage-3.6-5.el9_6.src.rpm] (CVE-2026-4437, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm [transitive via pkg:rpm/redhat/libsemanage@3.6-5.el9_6?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libsemanage-3.6-5.el9_6.src.rpm] (CVE-2025-5702, CVE-2026-0915, CVE-2025-8058)", "name": "rhtpa_medium_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 52 } }, { "msg": "Found 9 low vulnerabilities.", "metadata": { "details": { "description": "Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/libblkid@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm [direct] (CVE-2026-3184), pkg:rpm/redhat/gnutls@3.8.3-6.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnutls-3.8.3-6.el9_6.2.src.rpm [direct] (CVE-2026-3832), pkg:rpm/redhat/libxml2@2.9.13-12.el9_6?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libxml2-2.9.13-12.el9_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/glib2@2.68.4-16.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glib2-2.68.4-16.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/gnutls@3.8.3-6.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gnutls-3.8.3-6.el9_6.2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-3832), pkg:rpm/redhat/libgcrypt@1.10.0-11.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libgcrypt-1.10.0-11.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/libblkid@2.37.4-21.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=util-linux-2.37.4-21.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-12.el9?arch=x86_64\u0026distro=rhel-9.6\u0026epoch=2\u0026upstream=shadow-utils-4.9-12.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/libgcrypt@1.10.0-11.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libgcrypt-1.10.0-11.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-51.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=systemd-252-51.el9_6.2.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/libgcrypt@1.10.0-11.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libgcrypt-1.10.0-11.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2026-41990)", "name": "rhtpa_low_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 9 } } ] } ] {"vulnerabilities":{"critical":4,"high":27,"medium":52,"low":9,"unknown":0},"unpatched_vulnerabilities":{"critical":0,"high":0,"medium":0,"low":0,"unknown":0}} {"image": {"pullspec": "quay.io/redhat-appstudio-qe/build-e2e-nzds/gl-multi-component-parent-efhj:on-pr-2c893e37429d77b511947e6a5677b4a45d304e09", "digests": ["sha256:2d3a415865193679f0cd7a43f68f81c864b9cfc32e5abd054b76552132256262"]}} {"result":"SUCCESS","timestamp":"2026-05-05T11:42:38+00:00","note":"Task tpa-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by TPA.","namespace":"default","successes":0,"failures":0,"warnings":0}