[ { "filename": "/tekton/home/tpa-report-amd64.json", "namespace": "required_checks", "successes": 4, "warnings": [ { "msg": "Found 6 critical vulnerabilities.", "metadata": { "details": { "description": "Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-3596)", "name": "rhtpa_critical_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 6 } }, { "msg": "Found 46 high vulnerabilities.", "metadata": { "details": { "description": "Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [direct] (CVE-2023-2953), pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm [direct] (CVE-2026-29111), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [direct] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [direct] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2026-1584, CVE-2026-33845, CVE-2026-33846), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_2.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2026-1584, CVE-2026-33845, CVE-2026-33846), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_2.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2026-1584, CVE-2026-33845, CVE-2026-33846), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2026-29111), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_2.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2026-1584, CVE-2026-33845, CVE-2026-33846), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_2.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2026-1584, CVE-2026-33845, CVE-2026-33846), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2026-1584, CVE-2026-33845, CVE-2026-33846), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libunistring@0.9.10-15.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libunistring-0.9.10-15.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libunistring@0.9.10-15.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libunistring-0.9.10-15.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libunistring@0.9.10-15.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libunistring-0.9.10-15.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libunistring@0.9.10-15.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libunistring-0.9.10-15.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libunistring@0.9.10-15.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libunistring-0.9.10-15.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gawk@5.1.0-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gawk-5.1.0-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gawk@5.1.0-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gawk-5.1.0-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gawk@5.1.0-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gawk-5.1.0-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gawk@5.1.0-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gawk-5.1.0-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gawk@5.1.0-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gawk-5.1.0-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2026-1584, CVE-2026-33845, CVE-2026-33846)", "name": "rhtpa_high_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 46 } }, { "msg": "Found 104 medium vulnerabilities.", "metadata": { "details": { "description": "Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm [direct] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [direct] (CVE-2025-68972), pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [direct] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [direct] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/libsmartcols@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [direct] (CVE-2025-14104), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-68972), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-4426, CVE-2025-60753, CVE-2026-5745, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2026-3833, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libmount@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libuuid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libblkid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libsmartcols@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_2.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2026-3833, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_2.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2026-4426, CVE-2025-60753, CVE-2026-5745, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2026-3833, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libmount@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libuuid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libblkid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/file-libs@5.39-12.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=file-5.39-12.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_2.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libarchive@3.5.3-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libarchive-3.5.3-4.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2026-4426, CVE-2025-60753, CVE-2026-5745, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/rpm@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=krb5-1.20.1-9.el9_2.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-68972), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2026-3833, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_2.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libmount@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libuuid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libblkid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2026-3833, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libuuid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2026-3833, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libuuid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libunistring@0.9.10-15.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libunistring-0.9.10-15.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libunistring@0.9.10-15.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libunistring-0.9.10-15.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libunistring@0.9.10-15.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libunistring-0.9.10-15.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libunistring@0.9.10-15.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libunistring-0.9.10-15.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libunistring@0.9.10-15.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libunistring-0.9.10-15.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libunistring@0.9.10-15.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libunistring-0.9.10-15.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gawk@5.1.0-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gawk-5.1.0-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gawk@5.1.0-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gawk-5.1.0-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/gawk@5.1.0-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gawk-5.1.0-6.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gawk@5.1.0-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gawk-5.1.0-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gawk@5.1.0-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gawk-5.1.0-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/gawk@5.1.0-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gawk-5.1.0-6.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/gawk@5.1.0-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gawk-5.1.0-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-60.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glibc-2.34-60.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2026-3833, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libuuid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gcc-11.3.1-4.3.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2026-2100)", "name": "rhtpa_medium_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 104 } }, { "msg": "Found 14 low vulnerabilities.", "metadata": { "details": { "description": "Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [direct] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-3832), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/libblkid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.9.1-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=microdnf-3.9.1-3.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=openldap-2.6.2-3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_2.src.rpm [transitive via pkg:rpm/redhat/systemd-libs@252-14.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=systemd-252-14.el9_2.1.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2026-3832), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_2.src.rpm [transitive via pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2026-3832), pkg:rpm/redhat/libblkid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-2.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libmodulemd-2.13.0-2.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_2.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.26-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libusbx-1.0.26-1.el9.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/curl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.16.1.3-22.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=rpm-4.16.1.3-22.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.7-16.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026epoch=1\u0026upstream=openssl-3.0.7-16.el9_2.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libcurl-minimal@7.76.1-23.el9_2.1?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=curl-7.76.1-23.el9_2.1.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2026-3832), pkg:rpm/redhat/libgcrypt@1.10.0-10.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libgcrypt-1.10.0-10.el9_2.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/libblkid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/librepo@1.14.5-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=librepo-1.14.5-1.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2026-3832), pkg:rpm/redhat/libblkid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/json-glib@1.6.6-1.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=json-glib-1.6.6-1.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2026-3832), pkg:rpm/redhat/libblkid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-6.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=glib2-2.68.4-6.el9.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/gnutls@3.7.6-20.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=gnutls-3.7.6-20.el9_2.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2026-3832), pkg:rpm/redhat/libblkid@2.37.4-11.el9_2?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=util-linux-2.37.4-11.el9_2.src.rpm [transitive via pkg:rpm/redhat/libpeas@1.30.0-4.el9?arch=x86_64\u0026distro=rhel-9.2\u0026upstream=libpeas-1.30.0-4.el9.src.rpm] (CVE-2026-3184)", "name": "rhtpa_low_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 14 } } ] } ] {"vulnerabilities":{"critical":6,"high":46,"medium":104,"low":14,"unknown":0},"unpatched_vulnerabilities":{"critical":0,"high":0,"medium":0,"low":0,"unknown":0}} {"image": {"pullspec": "quay.io/redhat-appstudio-qe/build-e2e-cinv/gh-multi-component-child-ejvc:on-pr-fdd677f5cc76e1bd3539b31fcf6d724837f800f6", "digests": ["sha256:8bfd64be397820c72ae7b5693d01bea36ba0b0ec848cacbb18c89da1508ed381"]}} {"result":"SUCCESS","timestamp":"2026-05-13T12:59:47+00:00","note":"Task tpa-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by TPA.","namespace":"default","successes":0,"failures":0,"warnings":0}