<?xml version="1.0" encoding="UTF-8"?>
  <testsuites tests="464" disabled="173" errors="0" failures="5" time="2256.296153968">
      <testsuite name="Red Hat App Studio E2E tests" package="/tmp/tmp.Z3cR7n2baf/cmd" tests="464" disabled="88" skipped="85" errors="0" failures="5" time="2256.296153968" timestamp="2026-04-19T13:50:23">
          <properties>
              <property name="SuiteSucceeded" value="false"></property>
              <property name="SuiteHasProgrammaticFocus" value="false"></property>
              <property name="SpecialSuiteFailureReason" value=""></property>
              <property name="SuiteLabels" value="[]"></property>
              <property name="SuiteSemVerConstraints" value="[]"></property>
              <property name="RandomSeed" value="1776604849"></property>
              <property name="RandomizeAllSpecs" value="false"></property>
              <property name="LabelFilter" value="!upgrade-create &amp;&amp; !upgrade-verify &amp;&amp; !upgrade-cleanup &amp;&amp; !release-pipelines &amp;&amp; !disaster-recovery"></property>
              <property name="SemVerFilter" value=""></property>
              <property name="FocusStrings" value=""></property>
              <property name="SkipStrings" value=""></property>
              <property name="FocusFiles" value=""></property>
              <property name="SkipFiles" value=""></property>
              <property name="FailOnPending" value="false"></property>
              <property name="FailOnEmpty" value="false"></property>
              <property name="FailFast" value="false"></property>
              <property name="FlakeAttempts" value="0"></property>
              <property name="DryRun" value="false"></property>
              <property name="ParallelTotal" value="20"></property>
              <property name="OutputInterceptorMode" value="none"></property>
          </properties>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="failed" time="434.270546797">
              <failure message="Unexpected error:&#xA;    &lt;*fmt.wrapError | 0xc0009e0300&gt;: &#xA;    error migrating project konflux-qe/build-nudge-parent to konflux-qe/build-nudge-parent-vhbima (last error: You have already reached your limit of 100 repositories.): context deadline exceeded&#xA;    {&#xA;        msg: &#34;error migrating project konflux-qe/build-nudge-parent to konflux-qe/build-nudge-parent-vhbima (last error: You have already reached your limit of 100 repositories.): context deadline exceeded&#34;,&#xA;        err: &lt;context.deadlineExceededError&gt;{},&#xA;    }&#xA;occurred" type="failed">[FAILED] Unexpected error:&#xA;    &lt;*fmt.wrapError | 0xc0009e0300&gt;: &#xA;    error migrating project konflux-qe/build-nudge-parent to konflux-qe/build-nudge-parent-vhbima (last error: You have already reached your limit of 100 repositories.): context deadline exceeded&#xA;    {&#xA;        msg: &#34;error migrating project konflux-qe/build-nudge-parent to konflux-qe/build-nudge-parent-vhbima (last error: You have already reached your limit of 100 repositories.): context deadline exceeded&#34;,&#xA;        err: &lt;context.deadlineExceededError&gt;{},&#xA;    }&#xA;occurred&#xA;In [BeforeAll] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:131 @ 04/19/26 13:55:38.36&#xA;&#xA;There were additional failures detected after the initial failure. These are visible in the timeline&#xA;</failure>
              <system-err>&gt; Enter [BeforeAll] component update with renovate - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:72 @ 04/19/26 13:50:24.271&#xA;[FAILED] Unexpected error:&#xA;    &lt;*fmt.wrapError | 0xc0009e0300&gt;: &#xA;    error migrating project konflux-qe/build-nudge-parent to konflux-qe/build-nudge-parent-vhbima (last error: You have already reached your limit of 100 repositories.): context deadline exceeded&#xA;    {&#xA;        msg: &#34;error migrating project konflux-qe/build-nudge-parent to konflux-qe/build-nudge-parent-vhbima (last error: You have already reached your limit of 100 repositories.): context deadline exceeded&#34;,&#xA;        err: &lt;context.deadlineExceededError&gt;{},&#xA;    }&#xA;occurred&#xA;In [BeforeAll] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:131 @ 04/19/26 13:55:38.36&#xA;&lt; Exit [BeforeAll] component update with renovate - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:72 @ 04/19/26 13:55:38.36 (5m14.089s)&#xA;&gt; Enter [AfterAll] component update with renovate - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:214 @ 04/19/26 13:55:38.36&#xA;[FAILED] Timed out after 120.000s.&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc000fc40b0&gt;: &#xA;    could not check for namespace &#39;&#39; existence: resource name may not be empty&#xA;    {&#xA;        s: &#34;could not check for namespace &#39;&#39; existence: resource name may not be empty&#34;,&#xA;    }&#xA;In [AfterAll] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:230 @ 04/19/26 13:57:38.361&#xA;&lt; Exit [AfterAll] component update with renovate - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:214 @ 04/19/26 13:57:38.361 (2m0.001s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 13:57:38.361&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 13:57:38.54 (179ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:259 @ 04/19/26 13:57:38.541&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:274 @ 04/19/26 13:57:38.541&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:285 @ 04/19/26 13:57:38.542&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:289 @ 04/19/26 13:57:38.542&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:307 @ 04/19/26 13:57:38.542&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:318 @ 04/19/26 13:57:38.542&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:358 @ 04/19/26 13:57:38.542&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:375 @ 04/19/26 13:57:38.543&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:385 @ 04/19/26 13:57:38.543&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:401 @ 04/19/26 13:57:38.543&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:412 @ 04/19/26 13:57:38.543&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:429 @ 04/19/26 13:57:38.543&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:440 @ 04/19/26 13:57:38.543&#xA;</system-err>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when creating tenants on the old Konflux version should create both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when creating tenants on the old Konflux version should wait for all build PipelineRuns to succeed [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when backing up tenant data before upgrade should create backup CRs for both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when simulating disaster by deleting namespaces should delete both tenant namespaces [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when upgrading Konflux to the new version should upgrade the cluster and verify Velero survived [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when restoring tenants from backup on the new Konflux version should restore tenant-1 (KokoHazamar) via velero CLI method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when restoring tenants from backup on the new Konflux version should restore tenant-2 (MosheKipod) via oc command method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when performing post-restore recovery should rotate SA tokens on both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when verifying restored tenants should confirm structural integrity of both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Backwards-Compat] when verifying restored tenants should confirm functional pipeline execution after restore [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when creating tenants and running initial pipelines should create both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when creating tenants and running initial pipelines should wait for all build PipelineRuns to succeed [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when backing up tenant data should create backup CRs for both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when simulating disaster by deleting namespaces should delete both tenant namespaces [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when restoring from backup should restore tenant-1 (KokoHazamar) via velero CLI method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when restoring from backup should restore tenant-2 (MosheKipod) via oc command method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when performing post-restore recovery should rotate SA tokens on both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when verifying restored tenants should confirm structural integrity of both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Same-Version Backup/Restore] when verifying restored tenants should confirm functional pipeline execution after restore [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] post-release verification. block-releases true in ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. [release-service, release-neg, negBlockReleases]" classname="Red Hat App Studio E2E tests" status="passed" time="66.71932096">
              <system-err>&gt; Enter [BeforeAll] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.Z3cR7n2baf/tests/release/service/block_releases_release_plan_admission.go:34 @ 04/19/26 13:50:24.373&#xA;&lt; Exit [BeforeAll] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.Z3cR7n2baf/tests/release/service/block_releases_release_plan_admission.go:34 @ 04/19/26 13:50:48.746 (24.373s)&#xA;&gt; Enter [It] block-releases true in ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.Z3cR7n2baf/tests/release/service/block_releases_release_plan_admission.go:69 @ 04/19/26 13:50:48.746&#xA;&lt; Exit [It] block-releases true in ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.Z3cR7n2baf/tests/release/service/block_releases_release_plan_admission.go:69 @ 04/19/26 13:50:57.899 (9.153s)&#xA;&gt; Enter [AfterEach] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.Z3cR7n2baf/tests/release/service/block_releases_release_plan_admission.go:32 @ 04/19/26 13:50:57.899&#xA;&lt; Exit [AfterEach] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.Z3cR7n2baf/tests/release/service/block_releases_release_plan_admission.go:32 @ 04/19/26 13:50:57.899 (0s)&#xA;&gt; Enter [AfterAll] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.Z3cR7n2baf/tests/release/service/block_releases_release_plan_admission.go:61 @ 04/19/26 13:50:57.899&#xA;&lt; Exit [AfterAll] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.Z3cR7n2baf/tests/release/service/block_releases_release_plan_admission.go:61 @ 04/19/26 13:51:31.092 (33.193s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created test that cleanup happened successfully [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created check cleanup happened successfully [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created check cleanup happened successfully [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created check cleanup happened successfully [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] post-release verification. missing ReleasePlan makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. [release-service, release-neg, negMissingReleasePlan]" classname="Red Hat App Studio E2E tests" status="passed" time="39.52285834">
              <system-err>&gt; Enter [BeforeAll] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.Z3cR7n2baf/tests/release/service/missing_release_plan_and_admission.go:34 @ 04/19/26 13:50:24.07&#xA;&lt; Exit [BeforeAll] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.Z3cR7n2baf/tests/release/service/missing_release_plan_and_admission.go:34 @ 04/19/26 13:50:55.189 (31.119s)&#xA;&gt; Enter [It] missing ReleasePlan makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.Z3cR7n2baf/tests/release/service/missing_release_plan_and_admission.go:66 @ 04/19/26 13:50:55.189&#xA;&lt; Exit [It] missing ReleasePlan makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.Z3cR7n2baf/tests/release/service/missing_release_plan_and_admission.go:66 @ 04/19/26 13:51:03.593 (8.403s)&#xA;&gt; Enter [AfterEach] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.Z3cR7n2baf/tests/release/service/missing_release_plan_and_admission.go:32 @ 04/19/26 13:51:03.593&#xA;&lt; Exit [AfterEach] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.Z3cR7n2baf/tests/release/service/missing_release_plan_and_admission.go:32 @ 04/19/26 13:51:03.593 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] post-release verification. missing ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. [release-service, release-neg, negMissingReleasePlan]" classname="Red Hat App Studio E2E tests" status="passed" time="39.175071423">
              <system-err>&gt; Enter [It] missing ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.Z3cR7n2baf/tests/release/service/missing_release_plan_and_admission.go:76 @ 04/19/26 13:51:03.593&#xA;&lt; Exit [It] missing ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.Z3cR7n2baf/tests/release/service/missing_release_plan_and_admission.go:76 @ 04/19/26 13:51:03.63 (36ms)&#xA;&gt; Enter [AfterEach] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.Z3cR7n2baf/tests/release/service/missing_release_plan_and_admission.go:32 @ 04/19/26 13:51:03.63&#xA;&lt; Exit [AfterEach] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.Z3cR7n2baf/tests/release/service/missing_release_plan_and_admission.go:32 @ 04/19/26 13:51:03.63 (0s)&#xA;&gt; Enter [AfterAll] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.Z3cR7n2baf/tests/release/service/missing_release_plan_and_admission.go:58 @ 04/19/26 13:51:03.63&#xA;&lt; Exit [AfterAll] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.Z3cR7n2baf/tests/release/service/missing_release_plan_and_admission.go:58 @ 04/19/26 13:51:42.768 (39.138s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build annotations when component is created with invalid build request annotations handles invalid request annotation [build-service, github, annotations]" classname="Red Hat App Studio E2E tests" status="passed" time="86.967013412">
              <system-err>&gt; Enter [BeforeAll] test build annotations - /tmp/tmp.Z3cR7n2baf/tests/build/annotations.go:35 @ 04/19/26 13:50:24.468&#xA;&lt; Exit [BeforeAll] test build annotations - /tmp/tmp.Z3cR7n2baf/tests/build/annotations.go:35 @ 04/19/26 13:50:28.604 (4.136s)&#xA;&gt; Enter [BeforeAll] when component is created with invalid build request annotations - /tmp/tmp.Z3cR7n2baf/tests/build/annotations.go:69 @ 04/19/26 13:50:28.604&#xA;Image repository for component test-annotations-jkefhp in namespace build-e2e-izor do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when component is created with invalid build request annotations - /tmp/tmp.Z3cR7n2baf/tests/build/annotations.go:69 @ 04/19/26 13:50:49.374 (20.77s)&#xA;&gt; Enter [It] handles invalid request annotation - /tmp/tmp.Z3cR7n2baf/tests/build/annotations.go:89 @ 04/19/26 13:50:49.374&#xA;build status annotation value: {&#34;message&#34;:&#34;unexpected build request: foo&#34;}&#xA;&lt; Exit [It] handles invalid request annotation - /tmp/tmp.Z3cR7n2baf/tests/build/annotations.go:89 @ 04/19/26 13:51:49.388 (1m0.014s)&#xA;&gt; Enter [AfterAll] test build annotations - /tmp/tmp.Z3cR7n2baf/tests/build/annotations.go:51 @ 04/19/26 13:51:49.388&#xA;&lt; Exit [AfterAll] test build annotations - /tmp/tmp.Z3cR7n2baf/tests/build/annotations.go:51 @ 04/19/26 13:51:51.434 (2.046s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/annotations.go:24 @ 04/19/26 13:51:51.435&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/annotations.go:24 @ 04/19/26 13:51:51.435 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service tenant pipeline] Post-release verification verifies that a Release CR should have been created in the dev namespace [release-service, tenant]" classname="Red Hat App Studio E2E tests" status="passed" time="14.678023961">
              <system-err>&gt; Enter [BeforeAll] [release-service-suite Release service tenant pipeline] - /tmp/tmp.Z3cR7n2baf/tests/release/service/tenant_pipelines.go:41 @ 04/19/26 13:50:24.268&#xA;snapshotPush.Name: %s snapshot-sample-eccd&#xA;&lt; Exit [BeforeAll] [release-service-suite Release service tenant pipeline] - /tmp/tmp.Z3cR7n2baf/tests/release/service/tenant_pipelines.go:41 @ 04/19/26 13:50:36.755 (12.487s)&#xA;&gt; Enter [It] verifies that a Release CR should have been created in the dev namespace - /tmp/tmp.Z3cR7n2baf/tests/release/service/tenant_pipelines.go:110 @ 04/19/26 13:50:36.756&#xA;&lt; Exit [It] verifies that a Release CR should have been created in the dev namespace - /tmp/tmp.Z3cR7n2baf/tests/release/service/tenant_pipelines.go:110 @ 04/19/26 13:50:38.946 (2.19s)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.Z3cR7n2baf/tests/release/service/tenant_pipelines.go:28 @ 04/19/26 13:50:38.946&#xA;&lt; Exit [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.Z3cR7n2baf/tests/release/service/tenant_pipelines.go:28 @ 04/19/26 13:50:38.946 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service tenant pipeline] Post-release verification verifies that Tenant PipelineRun is triggered [release-service, tenant]" classname="Red Hat App Studio E2E tests" status="passed" time="40.00935897">
              <system-err>&gt; Enter [It] verifies that Tenant PipelineRun is triggered - /tmp/tmp.Z3cR7n2baf/tests/release/service/tenant_pipelines.go:117 @ 04/19/26 13:50:38.947&#xA;PipelineRun has not been created yet for release %s/%s tenant-dev-swsv snapshot-sample-eccd-5bj4f&#xA;PipelineRun tenant-46wq9 reason: PipelineRunPending&#xA;PipelineRun tenant-46wq9 reason: Succeeded&#xA;&lt; Exit [It] verifies that Tenant PipelineRun is triggered - /tmp/tmp.Z3cR7n2baf/tests/release/service/tenant_pipelines.go:117 @ 04/19/26 13:51:18.956 (40.009s)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.Z3cR7n2baf/tests/release/service/tenant_pipelines.go:28 @ 04/19/26 13:51:18.956&#xA;&lt; Exit [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.Z3cR7n2baf/tests/release/service/tenant_pipelines.go:28 @ 04/19/26 13:51:18.956 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service tenant pipeline] Post-release verification verifies that a Release is marked as succeeded. [release-service, tenant]" classname="Red Hat App Studio E2E tests" status="passed" time="87.052131126">
              <system-err>&gt; Enter [It] verifies that a Release is marked as succeeded. - /tmp/tmp.Z3cR7n2baf/tests/release/service/tenant_pipelines.go:121 @ 04/19/26 13:51:18.956&#xA;&lt; Exit [It] verifies that a Release is marked as succeeded. - /tmp/tmp.Z3cR7n2baf/tests/release/service/tenant_pipelines.go:121 @ 04/19/26 13:51:18.964 (7ms)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.Z3cR7n2baf/tests/release/service/tenant_pipelines.go:28 @ 04/19/26 13:51:18.964&#xA;&lt; Exit [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.Z3cR7n2baf/tests/release/service/tenant_pipelines.go:28 @ 04/19/26 13:51:18.964 (0s)&#xA;&gt; Enter [AfterAll] [release-service-suite Release service tenant pipeline] - /tmp/tmp.Z3cR7n2baf/tests/release/service/tenant_pipelines.go:102 @ 04/19/26 13:51:18.964&#xA;&lt; Exit [AfterAll] [release-service-suite Release service tenant pipeline] - /tmp/tmp.Z3cR7n2baf/tests/release/service/tenant_pipelines.go:102 @ 04/19/26 13:52:46.008 (1m27.044s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that a Release CR should have been created in the dev namespace [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="passed" time="37.719357232">
              <system-err>&gt; Enter [BeforeAll] [release-service-suite Release service happy path] - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:42 @ 04/19/26 13:50:24.373&#xA;snapshotPush.Name: %s snapshot-sample-adio&#xA;&lt; Exit [BeforeAll] [release-service-suite Release service happy path] - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:42 @ 04/19/26 13:50:59.625 (35.252s)&#xA;&gt; Enter [It] verifies that a Release CR should have been created in the dev namespace - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:151 @ 04/19/26 13:50:59.625&#xA;&lt; Exit [It] verifies that a Release CR should have been created in the dev namespace - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:151 @ 04/19/26 13:51:02.092 (2.467s)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:27 @ 04/19/26 13:51:02.092&#xA;&lt; Exit [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:27 @ 04/19/26 13:51:02.092 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that Release PipelineRun is triggered [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="passed" time="80.029346872">
              <system-err>&gt; Enter [It] verifies that Release PipelineRun is triggered - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:158 @ 04/19/26 13:51:02.093&#xA;PipelineRun has not been created yet for release %s/%s happy-path-eidf snapshot-sample-adio-4v6hq&#xA;PipelineRun managed-wgvrk reason: Running&#xA;PipelineRun managed-wgvrk reason: Running&#xA;PipelineRun managed-wgvrk reason: Running&#xA;PipelineRun managed-wgvrk reason: Succeeded&#xA;&lt; Exit [It] verifies that Release PipelineRun is triggered - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:158 @ 04/19/26 13:52:22.122 (1m20.029s)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:27 @ 04/19/26 13:52:22.122&#xA;&lt; Exit [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:27 @ 04/19/26 13:52:22.122 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that Enterprise Contract Task has succeeded in the Release PipelineRun [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="passed" time="0.050798115">
              <system-err>&gt; Enter [It] verifies that Enterprise Contract Task has succeeded in the Release PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:162 @ 04/19/26 13:52:22.123&#xA;the status of the verify-conforma TaskRun on the release pipeline is: [{Succeeded True  {2026-04-19 13:52:13 +0000 UTC} Succeeded All Steps have completed executing}]&#xA;&lt; Exit [It] verifies that Enterprise Contract Task has succeeded in the Release PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:162 @ 04/19/26 13:52:22.173 (50ms)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:27 @ 04/19/26 13:52:22.174&#xA;&lt; Exit [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:27 @ 04/19/26 13:52:22.174 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that a Release is marked as succeeded. [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="passed" time="85.115966489">
              <system-err>&gt; Enter [It] verifies that a Release is marked as succeeded. - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:174 @ 04/19/26 13:52:22.174&#xA;&lt; Exit [It] verifies that a Release is marked as succeeded. - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:174 @ 04/19/26 13:52:22.189 (15ms)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:27 @ 04/19/26 13:52:22.189&#xA;&lt; Exit [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:27 @ 04/19/26 13:52:22.189 (0s)&#xA;&gt; Enter [AfterAll] [release-service-suite Release service happy path] - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:142 @ 04/19/26 13:52:22.189&#xA;&lt; Exit [AfterAll] [release-service-suite Release service happy path] - /tmp/tmp.Z3cR7n2baf/tests/release/service/happy_path.go:142 @ 04/19/26 13:53:47.29 (1m25.101s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates first component [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="27.946098475">
              <system-err>&gt; Enter [BeforeAll] test build secret lookup - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:32 @ 04/19/26 13:50:24.368&#xA;&lt; Exit [BeforeAll] test build secret lookup - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:32 @ 04/19/26 13:50:32.206 (7.838s)&#xA;&gt; Enter [BeforeAll] when two secrets are created - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:100 @ 04/19/26 13:50:32.206&#xA;&lt; Exit [BeforeAll] when two secrets are created - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:100 @ 04/19/26 13:50:32.223 (17ms)&#xA;&gt; Enter [It] creates first component - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:123 @ 04/19/26 13:50:32.223&#xA;Image repository for component component-one-lhcg in namespace build-e2e-adbs do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates first component - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:123 @ 04/19/26 13:50:52.312 (20.089s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:25 @ 04/19/26 13:50:52.313&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:25 @ 04/19/26 13:50:52.313 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates second component [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="40.042031685">
              <system-err>&gt; Enter [It] creates second component - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:140 @ 04/19/26 13:50:52.314&#xA;Image repository for component component-two-kwtk in namespace build-e2e-adbs do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component component-two-kwtk in namespace build-e2e-adbs do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component component-two-kwtk in namespace build-e2e-adbs do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates second component - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:140 @ 04/19/26 13:51:32.355 (40.042s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:25 @ 04/19/26 13:51:32.355&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:25 @ 04/19/26 13:51:32.355 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created check first component annotation has errors [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="0.006312769">
              <system-err>&gt; Enter [It] check first component annotation has errors - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:158 @ 04/19/26 13:51:32.356&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;error&#34;,&#34;error-id&#34;:74,&#34;error-message&#34;:&#34;74: Access token is unrecognizable by GitHub&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;&lt; Exit [It] check first component annotation has errors - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:158 @ 04/19/26 13:51:32.362 (6ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:25 @ 04/19/26 13:51:32.362&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:25 @ 04/19/26 13:51:32.362 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created triggered PipelineRun is for component  [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="40.06412697">
              <system-err>&gt; Enter [It] triggered PipelineRun is for component  - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:178 @ 04/19/26 13:51:32.363&#xA;PipelineRun has not been created yet for the component build-e2e-adbs/component-two-kwtk&#xA;PipelineRun has not been created yet for the component build-e2e-adbs/component-two-kwtk&#xA;&lt; Exit [It] triggered PipelineRun is for component  - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:178 @ 04/19/26 13:52:12.426 (40.064s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:25 @ 04/19/26 13:52:12.427&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:25 @ 04/19/26 13:52:12.427 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created check only one pipelinerun should be triggered [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="123.129860157">
              <system-err>&gt; Enter [It] check only one pipelinerun should be triggered - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:193 @ 04/19/26 13:52:12.427&#xA;&lt; Exit [It] check only one pipelinerun should be triggered - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:193 @ 04/19/26 13:54:12.428 (2m0.001s)&#xA;&gt; Enter [AfterAll] test build secret lookup - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:61 @ 04/19/26 13:54:12.429&#xA;&lt; Exit [AfterAll] test build secret lookup - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:61 @ 04/19/26 13:54:15.557 (3.128s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:25 @ 04/19/26 13:54:15.557&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/secret_lookup.go:25 @ 04/19/26 13:54:15.557 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created when second component is deleted, pac pr branch should not exist in the repo [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params when context points to a file [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params creates Tekton bundles from specific context [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params when context is the root directory [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params creates Tekton bundles when context points to a file and a directory [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params creates Tekton bundles when using negation [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params allows overriding HOME environment variable [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params allows overriding STEP image [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="failed" time="305.637088862">
              <failure message="Failed to fork repository for fj&#xA;Unexpected error:&#xA;    &lt;*fmt.wrapError | 0xc000adf1c0&gt;: &#xA;    error migrating project konflux-qe/devfile-sample-hello-world to konflux-qe/devfile-sample-hello-world-vpbcor (last error: You have already reached your limit of 100 repositories.): context deadline exceeded&#xA;    {&#xA;        msg: &#34;error migrating project konflux-qe/devfile-sample-hello-world to konflux-qe/devfile-sample-hello-world-vpbcor (last error: You have already reached your limit of 100 repositories.): context deadline exceeded&#34;,&#xA;        err: &lt;context.deadlineExceededError&gt;{},&#xA;    }&#xA;occurred" type="failed">[FAILED] Failed to fork repository for fj&#xA;Unexpected error:&#xA;    &lt;*fmt.wrapError | 0xc000adf1c0&gt;: &#xA;    error migrating project konflux-qe/devfile-sample-hello-world to konflux-qe/devfile-sample-hello-world-vpbcor (last error: You have already reached your limit of 100 repositories.): context deadline exceeded&#xA;    {&#xA;        msg: &#34;error migrating project konflux-qe/devfile-sample-hello-world to konflux-qe/devfile-sample-hello-world-vpbcor (last error: You have already reached your limit of 100 repositories.): context deadline exceeded&#34;,&#xA;        err: &lt;context.deadlineExceededError&gt;{},&#xA;    }&#xA;occurred&#xA;In [BeforeAll] at: /tmp/tmp.Z3cR7n2baf/tests/build/git_provider_config.go:329 @ 04/19/26 13:55:29.552&#xA;</failure>
              <system-err>&gt; Enter [BeforeAll] PaC component build - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:55 @ 04/19/26 13:50:24.271&#xA;[FAILED] Failed to fork repository for fj&#xA;Unexpected error:&#xA;    &lt;*fmt.wrapError | 0xc000adf1c0&gt;: &#xA;    error migrating project konflux-qe/devfile-sample-hello-world to konflux-qe/devfile-sample-hello-world-vpbcor (last error: You have already reached your limit of 100 repositories.): context deadline exceeded&#xA;    {&#xA;        msg: &#34;error migrating project konflux-qe/devfile-sample-hello-world to konflux-qe/devfile-sample-hello-world-vpbcor (last error: You have already reached your limit of 100 repositories.): context deadline exceeded&#34;,&#xA;        err: &lt;context.deadlineExceededError&gt;{},&#xA;    }&#xA;occurred&#xA;In [BeforeAll] at: /tmp/tmp.Z3cR7n2baf/tests/build/git_provider_config.go:329 @ 04/19/26 13:55:29.552&#xA;&lt; Exit [BeforeAll] PaC component build - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:55 @ 04/19/26 13:55:29.552 (5m5.281s)&#xA;&gt; Enter [AfterAll] PaC component build - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:102 @ 04/19/26 13:55:29.552&#xA;&lt; Exit [AfterAll] PaC component build - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:102 @ 04/19/26 13:55:29.552 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:55:29.553&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:55:29.908 (355ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:154 @ 04/19/26 13:55:29.909&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:177 @ 04/19/26 13:55:29.909&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:192 @ 04/19/26 13:55:29.909&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:196 @ 04/19/26 13:55:29.91&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:226 @ 04/19/26 13:55:29.91&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:244 @ 04/19/26 13:55:29.91&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:250 @ 04/19/26 13:55:29.91&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:266 @ 04/19/26 13:55:29.911&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:279 @ 04/19/26 13:55:29.911&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:333 @ 04/19/26 13:55:29.911&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:348 @ 04/19/26 13:55:29.911&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:366 @ 04/19/26 13:55:29.912&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:372 @ 04/19/26 13:55:29.912&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created floating tags are created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:391 @ 04/19/26 13:55:29.912&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:404 @ 04/19/26 13:55:29.912&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:410 @ 04/19/26 13:55:29.912&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:439 @ 04/19/26 13:55:29.913&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:453 @ 04/19/26 13:55:29.913&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:478 @ 04/19/26 13:55:29.913&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:493 @ 04/19/26 13:55:29.913&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:512 @ 04/19/26 13:55:29.913&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:518 @ 04/19/26 13:55:29.914&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:544 @ 04/19/26 13:55:29.914&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:560 @ 04/19/26 13:55:29.914&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:566 @ 04/19/26 13:55:29.914&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:578 @ 04/19/26 13:55:29.915&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:609 @ 04/19/26 13:55:29.915&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the component is removed and recreated (with the same name in the same namespace) should no longer lead to a creation of a PaC PR [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:729 @ 04/19/26 13:55:29.915&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies if release CR is created [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies the advs release pipelinerun is running and succeeds [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies if the repository URL is valid [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] infrastructure is running verifies if the chains controller is running [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="7.60449052">
              <system-err>&gt; Enter [BeforeAll] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:31 @ 04/19/26 13:50:24.269&#xA;&lt; Exit [BeforeAll] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:31 @ 04/19/26 13:50:31.435 (7.166s)&#xA;&gt; Enter [It] verifies if the chains controller is running - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:43 @ 04/19/26 13:50:31.435&#xA;&lt; Exit [It] verifies if the chains controller is running - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:43 @ 04/19/26 13:50:31.873 (438ms)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:29 @ 04/19/26 13:50:31.873&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:29 @ 04/19/26 13:50:31.873 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] infrastructure is running verifies the signing secret is present [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="0.388617899">
              <system-err>&gt; Enter [It] verifies the signing secret is present - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:48 @ 04/19/26 13:50:31.874&#xA;&lt; Exit [It] verifies the signing secret is present - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:48 @ 04/19/26 13:50:32.262 (388ms)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:29 @ 04/19/26 13:50:32.262&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:29 @ 04/19/26 13:50:32.262 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task creates signature and attestation [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="265.522426625">
              <system-err>&gt; Enter [BeforeAll] test creating and signing an image and task - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:73 @ 04/19/26 13:50:32.263&#xA;Creating Pipeline &#34;buildah-demo-ofptejhqkf&#34;&#xA;Waiting for pipeline &#34;buildah-demo-ofptejhqkf&#34; to finish&#xA;The pipeline named &#34;buildah-demo-ofptejhqkf&#34; in namespace &#34;chains-e2e-dycl&#34; succeeded&#xA;The image signed by Tekton Chains is quay.io/redhat-appstudio-qe/test-images:buildah-demo-ofptejhqkf@sha256:aa066e3589bb1434b90337c555498279251c91049a2b063f55535f9b169ff4c7&#xA;&lt; Exit [BeforeAll] test creating and signing an image and task - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:73 @ 04/19/26 13:54:56.504 (4m24.241s)&#xA;&gt; Enter [It] creates signature and attestation - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:115 @ 04/19/26 13:54:56.505&#xA;failed to get cosign result for image quay.io/redhat-appstudio-qe/test-images:buildah-demo-ofptejhqkf@sha256:aa066e3589bb1434b90337c555498279251c91049a2b063f55535f9b169ff4c7: failed to find cosign results for image quay.io/redhat-appstudio-qe/test-images:buildah-demo-ofptejhqkf@sha256:aa066e3589bb1434b90337c555498279251c91049a2b063f55535f9b169ff4c7: error when getting attestation tag: cannot get manifest digest from quay.io/redhat-appstudio-qe/test-images:sha256-aa066e3589bb1434b90337c555498279251c91049a2b063f55535f9b169ff4c7.att image. response body: {&#34;tags&#34;: [], &#34;page&#34;: 1, &#34;has_additional&#34;: false}&#xA;&#xA;&#xA;Cosign verify pass with .att and .sig ImageStreamTags found for quay.io/redhat-appstudio-qe/test-images:buildah-demo-ofptejhqkf@sha256:aa066e3589bb1434b90337c555498279251c91049a2b063f55535f9b169ff4c7&#xA;&lt; Exit [It] creates signature and attestation - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:115 @ 04/19/26 13:54:57.785 (1.28s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:29 @ 04/19/26 13:54:57.785&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:29 @ 04/19/26 13:54:57.785 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task succeeds when policy is met [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="failed" time="354.674048577">
              <failure message="Expected&#xA;    &lt;bool&gt;: false&#xA;to be true" type="failed">[FAILED] Expected&#xA;    &lt;bool&gt;: false&#xA;to be true&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:190 @ 04/19/26 14:00:52.107&#xA;</failure>
              <system-err>&gt; Enter [BeforeAll] verify-enterprise-contract task - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:133 @ 04/19/26 13:54:57.786&#xA;Copy public key from openshift-pipelines/signing-secrets to a new secret&#xA;Configured Rekor host: https://rekor.sigstore.dev&#xA;Using verify EC task bundle: quay.io/conforma/tekton-task:kf-cdfd9188f9352d7269ae1fe8c273a9e67f60ab8a@sha256:3801e78906a70b6dcf850a063cd90b8f5a785b3b54e39ba04630268b08703048&#xA;&lt; Exit [BeforeAll] verify-enterprise-contract task - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:133 @ 04/19/26 13:54:57.842 (56ms)&#xA;&gt; Enter [BeforeEach] verify-enterprise-contract task - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:154 @ 04/19/26 13:54:57.842&#xA;&lt; Exit [BeforeEach] verify-enterprise-contract task - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:154 @ 04/19/26 13:54:57.856 (14ms)&#xA;&gt; Enter [It] succeeds when policy is met - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:177 @ 04/19/26 13:54:57.856&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-szk9w&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-szk9w&#34; to finish&#xA;*** TaskRun status:&#xA;artifacts: {}&#xA;completionTime: &#34;2026-04-19T14:00:51Z&#34;&#xA;conditions:&#xA;- lastTransitionTime: &#34;2026-04-19T14:00:51Z&#34;&#xA;  message: &#39;&#34;step-show-config&#34; exited with code 2: Error&#39;&#xA;  reason: Failed&#xA;  status: &#34;False&#34;&#xA;  type: Succeeded&#xA;podName: verify-enterprise-contract-de36026b2ef7d2a482f9c09fe689cb4f-pod&#xA;provenance:&#xA;  featureFlags:&#xA;    awaitSidecarReadiness: true&#xA;    coschedule: workspaces&#xA;    enableAPIFields: alpha&#xA;    enableParamEnum: true&#xA;    enableProvenanceInStatus: true&#xA;    enforceNonfalsifiability: none&#xA;    maxResultSize: 4096&#xA;    resultExtractionMethod: termination-message&#xA;    runningInEnvWithInjectedSidecars: true&#xA;    verificationNoMatchPolicy: ignore&#xA;  refSource:&#xA;    digest:&#xA;      sha256: 3801e78906a70b6dcf850a063cd90b8f5a785b3b54e39ba04630268b08703048&#xA;    entryPoint: verify-enterprise-contract&#xA;    uri: quay.io/conforma/tekton-task&#xA;spanContext:&#xA;  traceparent: 00-34aeeef362eca8e520860846da9f88f8-0d870eced5088bce-01&#xA;startTime: &#34;2026-04-19T13:54:58Z&#34;&#xA;steps:&#xA;- container: step-initialize-tuf&#xA;  imageID: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;  name: initialize-tuf&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://b0ac0297e41cad925e8a7147cc1eb293446b3e0de0ed02bf986782c884cd71b0&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-04-19T14:00:45Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-04-19T14:00:45Z&#34;&#xA;  terminationReason: Skipped&#xA;- container: step-reduce&#xA;  imageID: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;  name: reduce&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://dfe1058c37195655877d72f7b41e1d4dc2e46916f1a67f7e9b908c092d01ee96&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-04-19T14:00:45Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-04-19T14:00:45Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-validate&#xA;  imageID: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;  name: validate&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://0c5bef5f1aaf6a9d5cb636492573adc19ebfc29b7383a4dd93aac0887605f230&#xA;    exitCode: 1&#xA;    finishedAt: &#34;2026-04-19T14:00:50Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-04-19T14:00:45Z&#34;&#xA;  terminationReason: Continued&#xA;- container: step-report-json&#xA;  imageID: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;  name: report-json&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://a397da7f830981cb8907767590811dc99da8fd8a2bde80e2f10aad45befcf2e8&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-04-19T14:00:50Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-04-19T14:00:50Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-summary&#xA;  imageID: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;  name: summary&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://913fbdb42689043d43d57083fefdb7d8cce89781f012a5b08e6561d182e6e7c6&#xA;    exitCode: 2&#xA;    finishedAt: &#34;2026-04-19T14:00:50Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-04-19T14:00:50Z&#34;&#xA;  terminationReason: Continued&#xA;- container: step-info&#xA;  imageID: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;  name: info&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://1023c3df2ffeb95999484b2664d4c72536c89739f72c847ccb21b12f6b3972ee&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-04-19T14:00:50Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-04-19T14:00:50Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-version&#xA;  imageID: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;  name: version&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://52c4e7be3bf3be12a4e61d73aa935ab586259d95939b87a8d9794cda77e9acfd&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-04-19T14:00:51Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-04-19T14:00:51Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-show-config&#xA;  imageID: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;  name: show-config&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://6658c6a231307377b18d2783cf09c77d237fcedfcbbb474020fc67b8367b3924&#xA;    exitCode: 2&#xA;    finishedAt: &#34;2026-04-19T14:00:51Z&#34;&#xA;    reason: Error&#xA;    startedAt: &#34;2026-04-19T14:00:51Z&#34;&#xA;  terminationReason: Error&#xA;- container: step-assert&#xA;  imageID: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;  name: assert&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://0a6fa39e6ceac6fadb7c7448489ba63adde2d335d949278be63f28fe37ff5975&#xA;    exitCode: 1&#xA;    finishedAt: &#34;2026-04-19T14:00:51Z&#34;&#xA;    reason: Error&#xA;    startedAt: &#34;2026-04-19T14:00:51Z&#34;&#xA;  terminationReason: Skipped&#xA;taskSpec:&#xA;  description: Verify the enterprise contract is met&#xA;  params:&#xA;  - description: |&#xA;      Spec section of an ApplicationSnapshot resource. Not all fields of the&#xA;      resource are required. A minimal example:&#xA;&#xA;      ```json&#xA;        {&#xA;          &#34;components&#34;: [&#xA;            {&#xA;              &#34;containerImage&#34;: &#34;quay.io/example/repo:latest&#34;&#xA;            }&#xA;          ]&#xA;        }&#xA;      ```&#xA;&#xA;      Each `containerImage` in the `components` array is validated.&#xA;    name: IMAGES&#xA;    type: string&#xA;  - default: enterprise-contract-service/default&#xA;    description: |&#xA;      Name of the policy configuration (EnterpriseContractPolicy&#xA;      resource) to use. `namespace/name` or `name` syntax supported. If&#xA;      namespace is omitted the namespace where the task runs is used.&#xA;      You can also specify a policy configuration using a git url, e.g.&#xA;      `github.com/conforma/config//slsa3`.&#xA;    name: POLICY_CONFIGURATION&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Public key used to verify signatures. Must be a valid k8s cosign&#xA;      reference, e.g. k8s://my-space/my-secret where my-secret contains the expected&#xA;      cosign.pub attribute.&#xA;    name: PUBLIC_KEY&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Rekor host for transparency log lookups&#xA;    name: REKOR_HOST&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Skip Rekor transparency log checks during validation.&#xA;    name: IGNORE_REKOR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: TUF mirror URL. Provide a value when NOT using public sigstore deployment.&#xA;    name: TUF_MIRROR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Path to a directory containing SSL certs to be used when communicating&#xA;      with external services. This is useful when using the integrated registry&#xA;      and a local instance of Rekor on a development cluster which may use&#xA;      certificates issued by a not-commonly trusted root CA. In such cases,&#xA;      `/var/run/secrets/kubernetes.io/serviceaccount` is a good value. Multiple&#xA;      paths can be provided by using the `:` separator.&#xA;    name: SSL_CERT_DIR&#xA;    type: string&#xA;  - default: trusted-ca&#xA;    description: The name of the ConfigMap to read CA bundle data from.&#xA;    name: CA_TRUST_CONFIGMAP_NAME&#xA;    type: string&#xA;  - default: ca-bundle.crt&#xA;    description: The name of the key in the ConfigMap that contains the CA bundle&#xA;      data.&#xA;    name: CA_TRUST_CONFIG_MAP_KEY&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Include rule titles and descriptions in the output. Set to `&#34;false&#34;`&#xA;      to disable it.&#xA;    name: INFO&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Fail the task if policy fails. Set to `&#34;false&#34;` to disable it.&#xA;    name: STRICT&#xA;    type: string&#xA;  - default: /tekton/home&#xA;    description: Value for the HOME environment variable.&#xA;    name: HOMEDIR&#xA;    type: string&#xA;  - default: now&#xA;    description: Run policy checks with the provided time.&#xA;    name: EFFECTIVE_TIME&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Merge additional Rego variables into the policy data. Use syntax&#xA;      &#34;key=value,key2=value2...&#34;&#xA;    name: EXTRA_RULE_DATA&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      This param is deprecated and will be removed in future. Its value is ignored. EC will be run without a timeout. (If you do want to apply a timeout use the Tekton task timeout.)&#xA;    name: TIMEOUT&#xA;    type: string&#xA;  - default: &#34;1&#34;&#xA;    description: Number of parallel workers to use for policy evaluation.&#xA;    name: WORKERS&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Reduce the Snapshot to only the component whose build caused the&#xA;      Snapshot to be created&#xA;    name: SINGLE_COMPONENT&#xA;    type: string&#xA;  - default: unknown&#xA;    description: |&#xA;      Name, including kind, of the Kubernetes resource to query for labels when single component mode is enabled, e.g. pr/somepipeline.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Kubernetes namespace where the SINGLE_COMPONENT_NAME is found. Only used when single component mode is enabled.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE_NS&#xA;    type: string&#xA;  results:&#xA;  - description: Short summary of the policy evaluation for each image&#xA;    name: TEST_OUTPUT&#xA;    type: string&#xA;  stepTemplate:&#xA;    computeResources: {}&#xA;    env:&#xA;    - name: HOME&#xA;      value: /tekton/home&#xA;  steps:&#xA;  - args:&#xA;    - sigstore&#xA;    - initialize&#xA;    - --mirror&#xA;    - &#34;&#34;&#xA;    - --root&#xA;    - /root.json&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;    name: initialize-tuf&#xA;    when:&#xA;    - operator: notin&#xA;      values:&#xA;      - &#34;&#34;&#xA;  - command:&#xA;    - reduce-snapshot.sh&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    env:&#xA;    - name: SNAPSHOT&#xA;      value: &#39;{&#34;application&#34;:&#34;&#34;,&#34;components&#34;:[{&#34;name&#34;:&#34;&#34;,&#34;containerImage&#34;:&#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-ofptejhqkf@sha256:aa066e3589bb1434b90337c555498279251c91049a2b063f55535f9b169ff4c7&#34;,&#34;source&#34;:{}}],&#34;artifacts&#34;:{}}&#39;&#xA;    - name: SINGLE_COMPONENT&#xA;      value: &#34;false&#34;&#xA;    - name: CUSTOM_RESOURCE&#xA;      value: unknown&#xA;    - name: CUSTOM_RESOURCE_NAMESPACE&#xA;    - name: SNAPSHOT_PATH&#xA;      value: /tekton/home/snapshot.json&#xA;    image: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;    name: reduce&#xA;    onError: continue&#xA;  - args:&#xA;    - validate&#xA;    - image&#xA;    - --images&#xA;    - /tekton/home/snapshot.json&#xA;    - --policy&#xA;    - ec-policy&#xA;    - --public-key&#xA;    - k8s://chains-e2e-dycl/cosign-public-key&#xA;    - --rekor-url&#xA;    - &#34;&#34;&#xA;    - --ignore-rekor=true&#xA;    - --workers&#xA;    - &#34;1&#34;&#xA;    - --info=true&#xA;    - --timeout=100h&#xA;    - --strict=false&#xA;    - --show-successes&#xA;    - --effective-time=now&#xA;    - --extra-rule-data=&#xA;    - --output&#xA;    - text?show-successes=false&#xA;    - --output&#xA;    - appstudio=/tekton/results/TEST_OUTPUT&#xA;    - --output&#xA;    - json=/tekton/home/report-json.json&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 2Gi&#xA;      requests:&#xA;        cpu: 1800m&#xA;        memory: 2Gi&#xA;    env:&#xA;    - name: SSL_CERT_DIR&#xA;      value: /tekton-custom-certs:/etc/ssl/certs:/etc/pki/tls/certs:/system/etc/security/cacerts:/var/run/secrets/kubernetes.io/serviceaccount&#xA;    - name: EC_CACHE&#xA;      value: &#34;false&#34;&#xA;    image: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;    name: validate&#xA;    onError: continue&#xA;    volumeMounts:&#xA;    - mountPath: /etc/pki/tls/certs/ca-custom-bundle.crt&#xA;      name: trusted-ca&#xA;      readOnly: true&#xA;      subPath: ca-bundle.crt&#xA;  - args:&#xA;    - jq . /tekton/home/report-json.json | awk &#39;{gsub(/^ +/, &#34;&#34;); acc += length; if&#xA;      (acc &gt;= 8000) { printf &#34;\n&#34;; acc=length } printf $0 }&#39;&#xA;    command:&#xA;    - sh&#xA;    - -c&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;    name: report-json&#xA;    onError: continue&#xA;  - args:&#xA;    - .&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;    name: summary&#xA;    onError: continue&#xA;  - args:&#xA;    - |&#xA;      ----- DEBUG OUTPUT -----&#xA;    command:&#xA;    - printf&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;    name: info&#xA;  - args:&#xA;    - version&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;    name: version&#xA;  - args:&#xA;    - &#39;{policy: .policy, key: .key, &#34;effective-time&#34;: .[&#34;effective-time&#34;]}&#39;&#xA;    - /tekton/home/report-json.json&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;    name: show-config&#xA;  - args:&#xA;    - --argjson&#xA;    - strict&#xA;    - &#34;true&#34;&#xA;    - -e&#xA;    - |&#xA;      .result == &#34;SUCCESS&#34; or .result == &#34;WARNING&#34; or ($strict | not)&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:9275ec5f062399135ecb3f54f520ee5f20e818a846c34250e0d417dce9221459&#xA;    name: assert&#xA;  volumes:&#xA;  - configMap:&#xA;      items:&#xA;      - key: ca-bundle.crt&#xA;        path: ca-bundle.crt&#xA;      name: trusted-ca&#xA;      optional: true&#xA;    name: trusted-ca&#xA;  workspaces:&#xA;  - description: The workspace where the snapshot spec json file resides&#xA;    name: data&#xA;    optional: true&#xA;&#xA;*** Logs from pod &#39;verify-enterprise-contract-de36026b2ef7d2a482f9c09fe689cb4f-pod&#39;, container &#39;step-initialize-tuf&#39;:&#xA;----- START -----2026/04/19 14:00:45 INFO Step was skipped due to when expressions were evaluated to false.&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-de36026b2ef7d2a482f9c09fe689cb4f-pod&#39;, container &#39;step-reduce&#39;:&#xA;----- START -----Single Component mode? false&#xA;{&#xA;  &#34;application&#34;: &#34;&#34;,&#xA;  &#34;components&#34;: [&#xA;    {&#xA;      &#34;name&#34;: &#34;&#34;,&#xA;      &#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-ofptejhqkf@sha256:aa066e3589bb1434b90337c555498279251c91049a2b063f55535f9b169ff4c7&#34;,&#xA;      &#34;source&#34;: {}&#xA;    }&#xA;  ],&#xA;  &#34;artifacts&#34;: {}&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-de36026b2ef7d2a482f9c09fe689cb4f-pod&#39;, container &#39;step-validate&#39;:&#xA;----- START -----Error: error validating image quay.io/redhat-appstudio-qe/test-images:buildah-demo-ofptejhqkf@sha256:aa066e3589bb1434b90337c555498279251c91049a2b063f55535f9b169ff4c7 of component : load: loading policies: get compiler: 5 errors occurred:&#xA;/tmp/ec-work-715229403/policy/ecc96998b/policy/lib/sbom/sbom.rego:88: rego_type_error: undefined function ec.oci.image_referrers&#xA;/tmp/ec-work-715229403/policy/ecc96998b/policy/lib/sbom/sbom.rego:98: rego_type_error: undefined function ec.oci.image_tag_refs&#xA;/tmp/ec-work-715229403/policy/ecc96998b/policy/release/slsa_build_scripted_build/slsa_build_scripted_build.rego:23: rego_type_error: undefined function ec.oci.image_manifests&#xA;/tmp/ec-work-715229403/policy/ecc96998b/policy/release/tasks/tasks.rego:37: rego_type_error: undefined function ec.oci.image_manifests&#xA;/tmp/ec-work-715229403/policy/ecc96998b/policy/release/trusted_task/trusted_task.rego:23: rego_type_error: undefined function ec.oci.image_manifests&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-de36026b2ef7d2a482f9c09fe689cb4f-pod&#39;, container &#39;step-report-json&#39;:&#xA;----- START -----jq: error: Could not open file /tekton/home/report-json.json: No such file or directory&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-de36026b2ef7d2a482f9c09fe689cb4f-pod&#39;, container &#39;step-summary&#39;:&#xA;----- START -----jq: error: Could not open file /tekton/results/TEST_OUTPUT: No such file or directory&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-de36026b2ef7d2a482f9c09fe689cb4f-pod&#39;, container &#39;step-info&#39;:&#xA;----- START ---------- DEBUG OUTPUT -----&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-de36026b2ef7d2a482f9c09fe689cb4f-pod&#39;, container &#39;step-version&#39;:&#xA;----- START -----Version            v0.7.111&#xA;Source ID          cdfd9188f9352d7269ae1fe8c273a9e67f60ab8a&#xA;Change date        2025-07-09 12:58:49 +0000 UTC (40 weeks ago)&#xA;ECC                v0.1.112&#xA;OPA                v0.70.0&#xA;Conftest           v0.55.0&#xA;Cosign             v2.4.1&#xA;Sigstore           v1.8.9&#xA;Rekor              v1.3.6&#xA;Tekton Pipeline    v0.63.0&#xA;Kubernetes Client  v0.31.0&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-de36026b2ef7d2a482f9c09fe689cb4f-pod&#39;, container &#39;step-show-config&#39;:&#xA;----- START -----jq: error: Could not open file /tekton/home/report-json.json: No such file or directory&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-de36026b2ef7d2a482f9c09fe689cb4f-pod&#39;, container &#39;step-assert&#39;:&#xA;----- START -----2026/04/19 14:00:51 Skipping step because a previous step failed&#xA;----- END -----&#xA;Make sure TaskRun verify-enterprise-contract of PipelineRun verify-enterprise-contract-run-szk9w succeeded&#xA;[FAILED] Expected&#xA;    &lt;bool&gt;: false&#xA;to be true&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:190 @ 04/19/26 14:00:52.107&#xA;&lt; Exit [It] succeeds when policy is met - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:177 @ 04/19/26 14:00:52.108 (5m54.251s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:29 @ 04/19/26 14:00:52.108&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:29 @ 04/19/26 14:00:52.46 (352ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task does not pass when tests are not satisfied on non-strict mode [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:197 @ 04/19/26 14:00:52.46&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task fails when tests are not satisfied on strict mode [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:225 @ 04/19/26 14:00:52.46&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task fails when unexpected signature is used [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:251 @ 04/19/26 14:00:52.461&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task ec-cli command verifies ec cli has error handling [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:279 @ 04/19/26 14:00:52.461&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task ec-cli command verifies ec validate accepts a list of image references [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:301 @ 04/19/26 14:00:52.461&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task Release Policy verifies redhat products pass the redhat policy rule collection before release  [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:345 @ 04/19/26 14:00:52.461&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task Release Policy verifies the release policy: Task are trusted [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:382 @ 04/19/26 14:00:52.461&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task Release Policy verifies the release policy: Task references are pinned [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/enterprise-contract/contract.go:422 @ 04/19/26 14:00:52.462&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification tests that Release CR is created for the Snapshot [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification verifies a release PipelineRun is started and succeeded in managed namespace [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification validate the result of task create-pyxis-image contains image ids [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification tests that Release CR has completed [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification validates that imageIds from task create-pyxis-image exist in Pyxis. [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification verifies that the ReleasePlan CR is unmatched in the beginning [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="28.557413767">
              <system-err>&gt; Enter [BeforeAll] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:32 @ 04/19/26 13:50:24.469&#xA;&lt; Exit [BeforeAll] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:32 @ 04/19/26 13:50:49.298 (24.829s)&#xA;&gt; Enter [It] verifies that the ReleasePlan CR is unmatched in the beginning - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:57 @ 04/19/26 13:50:49.298&#xA;&lt; Exit [It] verifies that the ReleasePlan CR is unmatched in the beginning - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:57 @ 04/19/26 13:50:53.026 (3.728s)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:53.027&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:53.027 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification Creates ReleasePlanAdmission CR in corresponding managed namespace [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.030610573">
              <system-err>&gt; Enter [It] Creates ReleasePlanAdmission CR in corresponding managed namespace - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:72 @ 04/19/26 13:50:53.027&#xA;&lt; Exit [It] Creates ReleasePlanAdmission CR in corresponding managed namespace - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:72 @ 04/19/26 13:50:53.057 (30ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:53.058&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:53.058 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when ReleasePlanAdmission CR is created in managed namespace verifies that the ReleasePlan CR is set to matched [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="2.453245447">
              <system-err>&gt; Enter [It] verifies that the ReleasePlan CR is set to matched - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:85 @ 04/19/26 13:50:53.058&#xA;&lt; Exit [It] verifies that the ReleasePlan CR is set to matched - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:85 @ 04/19/26 13:50:55.511 (2.453s)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:55.511&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:55.511 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when ReleasePlanAdmission CR is created in managed namespace verifies that the ReleasePlanAdmission CR is set to matched [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.005895541">
              <system-err>&gt; Enter [It] verifies that the ReleasePlanAdmission CR is set to matched - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:105 @ 04/19/26 13:50:55.512&#xA;&lt; Exit [It] verifies that the ReleasePlanAdmission CR is set to matched - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:105 @ 04/19/26 13:50:55.518 (5ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:55.518&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:55.518 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification Creates a manual release ReleasePlan CR in devNamespace [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.029832338">
              <system-err>&gt; Enter [It] Creates a manual release ReleasePlan CR in devNamespace - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:123 @ 04/19/26 13:50:55.518&#xA;&lt; Exit [It] Creates a manual release ReleasePlan CR in devNamespace - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:123 @ 04/19/26 13:50:55.548 (29ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:55.548&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:55.548 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when the second ReleasePlan CR is created verifies that the second ReleasePlan CR is set to matched [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.74245699">
              <system-err>&gt; Enter [It] verifies that the second ReleasePlan CR is set to matched - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:129 @ 04/19/26 13:50:55.548&#xA;&lt; Exit [It] verifies that the second ReleasePlan CR is set to matched - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:129 @ 04/19/26 13:50:56.29 (742ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:56.291&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:56.291 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when the second ReleasePlan CR is created verifies that the ReleasePlanAdmission CR has two matched ReleasePlan CRs [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.837147563">
              <system-err>&gt; Enter [It] verifies that the ReleasePlanAdmission CR has two matched ReleasePlan CRs - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:150 @ 04/19/26 13:50:56.292&#xA;&lt; Exit [It] verifies that the ReleasePlanAdmission CR has two matched ReleasePlan CRs - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:150 @ 04/19/26 13:50:57.128 (837ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:57.129&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:57.129 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification deletes one ReleasePlan CR [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.037460301">
              <system-err>&gt; Enter [It] deletes one ReleasePlan CR - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:171 @ 04/19/26 13:50:57.129&#xA;&lt; Exit [It] deletes one ReleasePlan CR - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:171 @ 04/19/26 13:50:57.166 (37ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:57.167&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:57.167 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when One ReleasePlan CR is deleted in managed namespace verifies that the ReleasePlanAdmission CR has only one matching ReleasePlan [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="1.24865024">
              <system-err>&gt; Enter [It] verifies that the ReleasePlanAdmission CR has only one matching ReleasePlan - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:177 @ 04/19/26 13:50:57.168&#xA;&lt; Exit [It] verifies that the ReleasePlanAdmission CR has only one matching ReleasePlan - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:177 @ 04/19/26 13:50:58.415 (1.248s)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:58.416&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:58.416 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification deletes the ReleasePlanAdmission CR [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.011733669">
              <system-err>&gt; Enter [It] deletes the ReleasePlanAdmission CR - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:198 @ 04/19/26 13:50:58.417&#xA;&lt; Exit [It] deletes the ReleasePlanAdmission CR - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:198 @ 04/19/26 13:50:58.428 (11ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:58.428&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:58.428 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when ReleasePlanAdmission CR is deleted in managed namespace verifies that the ReleasePlan CR has no matched ReleasePlanAdmission [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="25.261829726">
              <system-err>&gt; Enter [It] verifies that the ReleasePlan CR has no matched ReleasePlanAdmission - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:204 @ 04/19/26 13:50:58.429&#xA;&lt; Exit [It] verifies that the ReleasePlan CR has no matched ReleasePlanAdmission - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:204 @ 04/19/26 13:50:59.303 (874ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:59.303&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:30 @ 04/19/26 13:50:59.303 (0s)&#xA;&gt; Enter [AfterAll] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:48 @ 04/19/26 13:50:59.304&#xA;&lt; Exit [AfterAll] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.Z3cR7n2baf/tests/release/service/release_plan_and_admission_matched.go:48 @ 04/19/26 13:51:23.69 (24.387s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created does not contain an annotation with a Snapshot Name [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="72.203802342">
              <system-err>&gt; Enter [BeforeAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:45 @ 04/19/26 13:51:23.691&#xA;Image repository for component test-component-pac-snkqdo in namespace stat-rep-oqur do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component test-component-pac-snkqdo in namespace stat-rep-oqur do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Build PipelineRun has not been created yet for the component stat-rep-oqur/test-component-pac-snkqdo&#xA;Build PipelineRun has not been created yet for the component stat-rep-oqur/test-component-pac-snkqdo&#xA;&lt; Exit [BeforeAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:45 @ 04/19/26 13:52:35.894 (1m12.203s)&#xA;&gt; Enter [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:109 @ 04/19/26 13:52:35.895&#xA;&lt; Exit [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:109 @ 04/19/26 13:52:35.895 (0s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 13:52:35.895&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 13:52:35.895 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created should have a related PaC init PR created [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.185271641">
              <system-err>&gt; Enter [It] should have a related PaC init PR created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:113 @ 04/19/26 13:52:35.895&#xA;&lt; Exit [It] should have a related PaC init PR created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:113 @ 04/19/26 13:52:36.08 (185ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 13:52:36.08&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 13:52:36.08 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created initialized integration test status is reported to github [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.168787428">
              <system-err>&gt; Enter [It] initialized integration test status is reported to github - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:132 @ 04/19/26 13:52:36.081&#xA;&lt; Exit [It] initialized integration test status is reported to github - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:132 @ 04/19/26 13:52:36.249 (168ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 13:52:36.25&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 13:52:36.25 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created should lead to build PipelineRun finishing successfully [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="440.012789565">
              <system-err>&gt; Enter [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:142 @ 04/19/26 13:52:36.25&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: ResolvingTaskRef&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Running&#xA;PipelineRun test-component-pac-snkqdo-on-pull-request-wkkzg reason: Completed&#xA;&lt; Exit [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:142 @ 04/19/26 13:59:56.262 (7m20.012s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 13:59:56.263&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 13:59:56.263 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the PaC build pipelineRun run succeeded checks if the BuildPipelineRun have the annotation of chains signed [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.106874948">
              <system-err>&gt; Enter [It] checks if the BuildPipelineRun have the annotation of chains signed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:149 @ 04/19/26 13:59:56.263&#xA;&lt; Exit [It] checks if the BuildPipelineRun have the annotation of chains signed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:149 @ 04/19/26 13:59:56.37 (107ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 13:59:56.37&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 13:59:56.37 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the PaC build pipelineRun run succeeded checks if the Snapshot is created [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.005799868">
              <system-err>&gt; Enter [It] checks if the Snapshot is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:153 @ 04/19/26 13:59:56.371&#xA;&lt; Exit [It] checks if the Snapshot is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:153 @ 04/19/26 13:59:56.376 (6ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 13:59:56.376&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 13:59:56.376 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the PaC build pipelineRun run succeeded checks if the Build PipelineRun got annotated with Snapshot name [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.016137951">
              <system-err>&gt; Enter [It] checks if the Build PipelineRun got annotated with Snapshot name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:158 @ 04/19/26 13:59:56.377&#xA;&lt; Exit [It] checks if the Build PipelineRun got annotated with Snapshot name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:158 @ 04/19/26 13:59:56.392 (16ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 13:59:56.393&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 13:59:56.393 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the Snapshot was created should find both the related Integration PipelineRuns [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.016794935">
              <system-err>&gt; Enter [It] should find both the related Integration PipelineRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:164 @ 04/19/26 13:59:56.393&#xA;&lt; Exit [It] should find both the related Integration PipelineRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:164 @ 04/19/26 13:59:56.41 (16ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 13:59:56.41&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 13:59:56.41 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns are created should eventually complete successfully [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="20.111165004">
              <system-err>&gt; Enter [It] should eventually complete successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:183 @ 04/19/26 13:59:56.41&#xA;PipelineRun my-integration-test-qcrf-wrj5z reason: ResolvingTaskRef&#xA;PipelineRun my-integration-test-qcrf-wrj5z reason: Succeeded&#xA;PipelineRun my-integration-test-vkxk-cwdnn reason: Succeeded&#xA;PipelineRun my-integration-test-catd-bqqkl reason: Succeeded&#xA;&lt; Exit [It] should eventually complete successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:183 @ 04/19/26 14:00:16.521 (20.111s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:16.521&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:16.521 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully should lead to Snapshot CR being marked as failed [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.112414981">
              <system-err>&gt; Enter [It] should lead to Snapshot CR being marked as failed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:191 @ 04/19/26 14:00:16.522&#xA;&lt; Exit [It] should lead to Snapshot CR being marked as failed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:191 @ 04/19/26 14:00:16.634 (112ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:16.634&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:16.634 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the successful Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.422004683">
              <system-err>&gt; Enter [It] eventually leads to the status reported at Checks tab for the successful Integration PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:205 @ 04/19/26 14:00:16.634&#xA;&lt; Exit [It] eventually leads to the status reported at Checks tab for the successful Integration PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:205 @ 04/19/26 14:00:17.056 (422ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:17.056&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:17.056 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the failed Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.417574631">
              <system-err>&gt; Enter [It] eventually leads to the status reported at Checks tab for the failed Integration PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:209 @ 04/19/26 14:00:17.057&#xA;&lt; Exit [It] eventually leads to the status reported at Checks tab for the failed Integration PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:209 @ 04/19/26 14:00:17.474 (417ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:17.474&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:17.474 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the optional Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.36346225">
              <system-err>&gt; Enter [It] eventually leads to the status reported at Checks tab for the optional Integration PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:213 @ 04/19/26 14:00:17.475&#xA;&lt; Exit [It] eventually leads to the status reported at Checks tab for the optional Integration PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:213 @ 04/19/26 14:00:17.838 (363ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:17.838&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:17.838 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the optional Integration Test Scenario status is reported in the Snapshot [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.006655671">
              <system-err>&gt; Enter [It] checks if the optional Integration Test Scenario status is reported in the Snapshot - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:217 @ 04/19/26 14:00:17.839&#xA;&lt; Exit [It] checks if the optional Integration Test Scenario status is reported in the Snapshot - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:217 @ 04/19/26 14:00:17.845 (6ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:17.845&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:17.845 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the finalizer was removed from the optional Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.006351265">
              <system-err>&gt; Enter [It] checks if the finalizer was removed from the optional Integration PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:232 @ 04/19/26 14:00:17.846&#xA;&lt; Exit [It] checks if the finalizer was removed from the optional Integration PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:232 @ 04/19/26 14:00:17.852 (6ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:17.852&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:17.852 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully merging the PR, expected to succeed  [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="1.450983265">
              <system-err>&gt; Enter [It] merging the PR, expected to succeed  - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:236 @ 04/19/26 14:00:17.852&#xA;merged result sha: a00c803568d35c53ff49cb9de9a10800e44b4ce5 for PR #9380&#xA;&lt; Exit [It] merging the PR, expected to succeed  - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:236 @ 04/19/26 14:00:19.303 (1.451s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:19.303&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:19.303 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully leads to triggering a push PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="20.027235906">
              <system-err>&gt; Enter [It] leads to triggering a push PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:245 @ 04/19/26 14:00:19.304&#xA;Push PipelineRun has not been created yet for the component stat-rep-oqur/test-component-pac-snkqdo&#xA;&lt; Exit [It] leads to triggering a push PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:245 @ 04/19/26 14:00:39.331 (20.027s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:39.331&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:39.331 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully verifies that Push PipelineRuns completed [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.013285139">
              <system-err>&gt; Enter [It] verifies that Push PipelineRuns completed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:260 @ 04/19/26 14:00:39.331&#xA;PipelineRun my-integration-test-qcrf-wrj5z reason: Succeeded&#xA;PipelineRun my-integration-test-vkxk-cwdnn reason: Succeeded&#xA;&lt; Exit [It] verifies that Push PipelineRuns completed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:260 @ 04/19/26 14:00:39.344 (13ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:39.344&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:39.344 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully validates the Integration test scenario PipelineRun is reported to merge request CheckRuns, and it pass [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.339596714">
              <system-err>&gt; Enter [It] validates the Integration test scenario PipelineRun is reported to merge request CheckRuns, and it pass - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:265 @ 04/19/26 14:00:39.345&#xA;&lt; Exit [It] validates the Integration test scenario PipelineRun is reported to merge request CheckRuns, and it pass - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:265 @ 04/19/26 14:00:39.684 (339ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:39.684&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:39.684 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the failed Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.363922469">
              <system-err>&gt; Enter [It] eventually leads to the status reported at Checks tab for the failed Integration PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:270 @ 04/19/26 14:00:39.685&#xA;&lt; Exit [It] eventually leads to the status reported at Checks tab for the failed Integration PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:270 @ 04/19/26 14:00:40.048 (363ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:40.049&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:00:40.049 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when The git-provider annotation is missing should set the git-reporting-failure annotation correctly [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="20.122405895">
              <system-err>&gt; Enter [It] should set the git-reporting-failure annotation correctly - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:276 @ 04/19/26 14:00:40.049&#xA;gitReportingFailureAnnotation does not exist. Annotations: map[build.appstudio.openshift.io/repo:https://github.com/redhat-appstudio-qe/konflux-test-integration-status-report?rev=4a5f3ee2165226671b27ea295c6b2b64cdefd1d1 build.appstudio.redhat.com/commit_sha:4a5f3ee2165226671b27ea295c6b2b64cdefd1d1 build.appstudio.redhat.com/pull_request_number:9380 build.appstudio.redhat.com/target_branch:base-ygzqvx pac.test.appstudio.openshift.io/branch:base-ygzqvx pac.test.appstudio.openshift.io/cancel-in-progress:true pac.test.appstudio.openshift.io/check-run-id:72017396987 pac.test.appstudio.openshift.io/controller-info:{&#34;name&#34;:&#34;default&#34;,&#34;configmap&#34;:&#34;pipelines-as-code&#34;,&#34;secret&#34;:&#34;pipelines-as-code-secret&#34;, &#34;gRepo&#34;: &#34;pipelines-as-code&#34;} pac.test.appstudio.openshift.io/event-type:pull_request pac.test.appstudio.openshift.io/git-auth-secret:pac-gitauth-ippcti pac.test.appstudio.openshift.io/git-provider:not-supported-provider pac.test.appstudio.openshift.io/installation-id:40773614 pac.test.appstudio.openshift.io/log-url:https://console-openshift-console.apps.rosa.kx-05371b0f71.qwxl.p3.openshiftapps.com/k8s/ns/stat-rep-oqur/tekton.dev~v1~PipelineRun/test-component-pac-snkqdo-on-pull-request-wkkzg pac.test.appstudio.openshift.io/max-keep-runs:3 pac.test.appstudio.openshift.io/on-cel-expression:event == &#34;pull_request&#34; &amp;&amp; target_branch == &#34;base-ygzqvx&#34; pac.test.appstudio.openshift.io/original-prname:test-component-pac-snkqdo-on-pull-request pac.test.appstudio.openshift.io/pull-request:9380 pac.test.appstudio.openshift.io/repo-url:https://github.com/redhat-appstudio-qe/konflux-test-integration-status-report pac.test.appstudio.openshift.io/repository:test-component-pac-snkqdo pac.test.appstudio.openshift.io/scm-reporting-plr-started:true pac.test.appstudio.openshift.io/sender:rhtap-qe-app[bot] pac.test.appstudio.openshift.io/sha:4a5f3ee2165226671b27ea295c6b2b64cdefd1d1 pac.test.appstudio.openshift.io/sha-title:RHTAP-Qe-App update test-component-pac-snkqdo pac.test.appstudio.openshift.io/sha-url:https://github.com/redhat-appstudio-qe/konflux-test-integration-status-report/commit/4a5f3ee2165226671b27ea295c6b2b64cdefd1d1 pac.test.appstudio.openshift.io/source-branch:konflux-test-component-pac-snkqdo pac.test.appstudio.openshift.io/source-repo-url:https://github.com/redhat-appstudio-qe/konflux-test-integration-status-report pac.test.appstudio.openshift.io/state:completed pac.test.appstudio.openshift.io/url-org:redhat-appstudio-qe pac.test.appstudio.openshift.io/url-repository:konflux-test-integration-status-report test.appstudio.openshift.io/create-groupsnapshot-status:The number 0 of component snapshots belonging to this pr group hash e05ce28830e89659e1d7ad3aee38c33ec4deadd22bbd2212c2c770c238e3df is less than 2, skipping group snapshot creation test.appstudio.openshift.io/git-reporter-status:{&#34;scenarios&#34;:{&#34;my-integration-test-catd-integ-app-xnor-20260419-135231-000&#34;:{&#34;lastUpdateTime&#34;:&#34;2026-04-19T14:00:06.901316239Z&#34;},&#34;my-integration-test-qcrf-integ-app-xnor-20260419-135231-000&#34;:{&#34;lastUpdateTime&#34;:&#34;2026-04-19T14:00:05.150649045Z&#34;},&#34;my-integration-test-vkxk-integ-app-xnor-20260419-135231-000&#34;:{&#34;lastUpdateTime&#34;:&#34;2026-04-19T14:00:05.358783274Z&#34;}}} test.appstudio.openshift.io/integration-workflow:pull-request test.appstudio.openshift.io/pipelinerunstarttime:1776606751000 test.appstudio.openshift.io/pr-group:konflux-test-component-pac-snkqdo test.appstudio.openshift.io/pr-status:merged test.appstudio.openshift.io/snapshot-creation-report:SnapshotCreationFailed test.appstudio.openshift.io/source-repo-url:https://github.com/redhat-appstudio-qe/konflux-test-integration-status-report test.appstudio.openshift.io/status:[{&#34;completionTime&#34;:&#34;2026-04-19T14:00:05.150649045Z&#34;,&#34;details&#34;:&#34;Integration test passed&#34;,&#34;lastUpdateTime&#34;:&#34;2026-04-19T14:00:40Z&#34;,&#34;scenario&#34;:&#34;my-integration-test-qcrf&#34;,&#34;startTime&#34;:&#34;2026-04-19T13:59:54.842396102Z&#34;,&#34;status&#34;:&#34;TestPassed&#34;,&#34;testPipelineRunName&#34;:&#34;my-integration-test-qcrf-wrj5z&#34;},{&#34;completionTime&#34;:&#34;2026-04-19T14:00:05.358783274Z&#34;,&#34;details&#34;:&#34;Integration test failed&#34;,&#34;lastUpdateTime&#34;:&#34;2026-04-19T14:00:05.358783274Z&#34;,&#34;scenario&#34;:&#34;my-integration-test-vkxk&#34;,&#34;startTime&#34;:&#34;2026-04-19T13:59:54.895122582Z&#34;,&#34;status&#34;:&#34;TestFail&#34;,&#34;testPipelineRunName&#34;:&#34;my-integration-test-vkxk-cwdnn&#34;},{&#34;completionTime&#34;:&#34;2026-04-19T14:00:06.901316239Z&#34;,&#34;details&#34;:&#34;Integration test failed&#34;,&#34;isOptionalScenario&#34;:true,&#34;lastUpdateTime&#34;:&#34;2026-04-19T14:00:06.901316239Z&#34;,&#34;scenario&#34;:&#34;my-integration-test-catd&#34;,&#34;startTime&#34;:&#34;2026-04-19T13:59:54.987333842Z&#34;,&#34;status&#34;:&#34;TestFail&#34;,&#34;testPipelineRunName&#34;:&#34;my-integration-test-catd-bqqkl&#34;}]]&#xA;&lt; Exit [It] should set the git-reporting-failure annotation correctly - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:276 @ 04/19/26 14:01:00.171 (20.122s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:01:00.172&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:01:00.172 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when build pipelinerun fails build pipelinerun is created but fails [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="8.092028652">
              <system-err>&gt; Enter [It] build pipelinerun is created but fails - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:323 @ 04/19/26 14:01:00.172&#xA;Waiting for pipeline &#34;failing-build-plr-xusp&#34; to finish&#xA;&lt; Exit [It] build pipelinerun is created but fails - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:323 @ 04/19/26 14:01:08.264 (8.092s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:01:08.264&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:01:08.264 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when build pipelinerun fails build pipelinerun failure is reported to integration test checkRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="24.292899644">
              <system-err>&gt; Enter [It] build pipelinerun failure is reported to integration test checkRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:368 @ 04/19/26 14:01:08.264&#xA;failed to check expected checkRun text, actual text is %!s(&lt;nil&gt;): &#xA;%!(EXTRA string=build pipelinerun stat-rep-oqur/failing-build-plr-xusp is still in progress)&#xA;&lt; Exit [It] build pipelinerun failure is reported to integration test checkRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:368 @ 04/19/26 14:01:28.736 (20.472s)&#xA;&gt; Enter [AfterAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:92 @ 04/19/26 14:01:28.736&#xA;&lt; Exit [AfterAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:92 @ 04/19/26 14:01:32.557 (3.821s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:01:32.557&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 04/19/26 14:01:32.557 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created triggers a Build PipelineRun [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="102.376009256">
              <system-err>&gt; Enter [BeforeAll] Gitlab with status reporting of Integration tests in the assosiated merge request - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:45 @ 04/19/26 13:50:24.069&#xA;&lt; Exit [BeforeAll] Gitlab with status reporting of Integration tests in the assosiated merge request - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:45 @ 04/19/26 13:50:36.126 (12.057s)&#xA;&gt; Enter [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:109 @ 04/19/26 13:50:36.126&#xA;Image repository for component test-comp-pac-gitlab-axhyxp in namespace gitlab-rep-ehhc do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component test-comp-pac-gitlab-axhyxp in namespace gitlab-rep-ehhc do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component test-comp-pac-gitlab-axhyxp in namespace gitlab-rep-ehhc do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component test-comp-pac-gitlab-axhyxp in namespace gitlab-rep-ehhc do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:109 @ 04/19/26 13:51:26.407 (50.281s)&#xA;&gt; Enter [It] triggers a Build PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:130 @ 04/19/26 13:51:26.407&#xA;Build PipelineRun has not been created yet for the component gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp&#xA;Build PipelineRun has not been created yet for the component gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp&#xA;&lt; Exit [It] triggers a Build PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:130 @ 04/19/26 13:52:06.444 (40.037s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 13:52:06.444&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 13:52:06.444 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created does not contain an annotation with a Snapshot Name [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000385787">
              <system-err>&gt; Enter [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:144 @ 04/19/26 13:52:06.445&#xA;&lt; Exit [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:144 @ 04/19/26 13:52:06.445 (0s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 13:52:06.445&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 13:52:06.445 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created should lead to build PipelineRun finishing successfully [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="692.513398956">
              <system-err>&gt; Enter [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:148 @ 04/19/26 13:52:06.446&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm found for Component gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm reason: Failed&#xA;attempt 1/3: PipelineRun &#34;test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm&#34; failed: &#xA; pod: test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm-init-pod | init container: prepare&#xA;2026/04/19 13:51:59 Entrypoint initialization&#xA;&#xA;pod: test-comp-pac-gitlab-axhyxp-on-pull-request-8d7zm-init-pod | container step-init: &#xA;time=&#34;2026-04-19T13:52:00Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-19T13:52:00Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-19T13:52:00Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-19T13:52:00Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-19T13:52:00Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-19T13:52:00Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-19T13:52:00Z&#34; level=info msg=&#34;Cache proxy is disabled in param or in backend&#34;&#xA;time=&#34;2026-04-19T13:52:00Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-19T13:52:00Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: test-comp-pac-gitlab-axhyxp8750c7426def474b8d17d753c7d361da-pod | init container: prepare&#xA;2026/04/19 13:57:43 Entrypoint initialization&#xA;&#xA; pod: test-comp-pac-gitlab-axhyxp8750c7426def474b8d17d753c7d361da-pod | init container: place-scripts&#xA;2026/04/19 13:57:44 Decoded script /tekton/scripts/script-0-tkj8k&#xA;2026/04/19 13:57:44 Decoded script /tekton/scripts/script-1-pmpg4&#xA;2026/04/19 13:57:44 Decoded script /tekton/scripts/script-2-glwj6&#xA;2026/04/19 13:57:44 Decoded script /tekton/scripts/script-3-rmklf&#xA;&#xA;pod: test-comp-pac-gitlab-axhyxp8750c7426def474b8d17d753c7d361da-pod | container step-get-image-manifests: &#xA;Inspecting raw image manifest quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp@sha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa.&#xA;&#xA;pod: test-comp-pac-gitlab-axhyxp8750c7426def474b8d17d753c7d361da-pod | container step-get-vulnerabilities: &#xA;Running clair-action on amd64 image manifest...&#xA;�[90m2026-04-19T13:59:33Z�[0m �[32mINF�[0m �[1mmatchers created�[0m �[36mcomponent=�[0mlibvuln/New �[36mmatchers=�[0m[{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/gobin&#34;,&#34;name&#34;:&#34;gobin&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/oracle&#34;,&#34;name&#34;:&#34;oracle&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/aws&#34;,&#34;name&#34;:&#34;aws-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/java&#34;,&#34;name&#34;:&#34;java-maven&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/photon&#34;,&#34;name&#34;:&#34;photon&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel/rhcc&#34;,&#34;name&#34;:&#34;rhel-container-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/python&#34;,&#34;name&#34;:&#34;python&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/suse&#34;,&#34;name&#34;:&#34;suse&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/alpine&#34;,&#34;name&#34;:&#34;alpine-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/debian&#34;,&#34;name&#34;:&#34;debian-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ruby&#34;,&#34;name&#34;:&#34;ruby-gem&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ubuntu&#34;,&#34;name&#34;:&#34;ubuntu-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel&#34;,&#34;name&#34;:&#34;rhel&#34;}]&#xA;�[90m2026-04-19T13:59:33Z�[0m �[32mINF�[0m �[1mlibvuln initialized�[0m �[36mcomponent=�[0mlibvuln/New&#xA;�[90m2026-04-19T13:59:33Z�[0m �[32mINF�[0m �[1mregistered configured scanners�[0m �[36mcomponent=�[0mlibindex/New&#xA;�[90m2026-04-19T13:59:33Z�[0m �[32mINF�[0m �[1mNewLayerScanner: constructing a new layer-scanner�[0m �[36mcomponent=�[0mindexer.NewLayerScanner&#xA;�[90m2026-04-19T13:59:33Z�[0m �[32mINF�[0m �[1mindex request start�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa&#xA;�[90m2026-04-19T13:59:33Z�[0m �[32mINF�[0m �[1mstarting scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa&#xA;�[90m2026-04-19T13:59:33Z�[0m �[32mINF�[0m �[1mmanifest to be scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa �[36mstate=�[0mCheckManifest&#xA;�[90m2026-04-19T13:59:33Z�[0m �[32mINF�[0m �[1mlayers fetch start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-19T13:59:35Z�[0m �[32mINF�[0m �[1mlayers fetch success�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-19T13:59:35Z�[0m �[32mINF�[0m �[1mlayers fetch done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-19T13:59:35Z�[0m �[32mINF�[0m �[1mlayers scan start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa �[36mstate=�[0mScanLayers&#xA;�[90m2026-04-19T13:59:35Z�[0m �[32mINF�[0m �[1mfound buildinfo Dockerfile�[0m �[36mcomponent=�[0mrhel/rhcc/scanner.Scan �[36mkind=�[0mpackage �[36mlayer=�[0msha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2 �[36mmanifest=�[0msha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa �[36mpath=�[0mroot/buildinfo/Dockerfile-ubi8-openjdk-17-runtime-1.23-4.1776047406 �[36mscanner=�[0mrhel_containerscanner �[36mstate=�[0mScanLayers&#xA;�[90m2026-04-19T13:59:35Z�[0m �[32mINF�[0m �[1mskipping jar�[0m �[36mcomponent=�[0mjava/Scanner.Scan �[36mfile=�[0musr/lib/jvm/java-17-openjdk-17.0.18.0.8-1.el8.x86_64/lib/jrt-fs.jar �[36mkind=�[0mpackage �[36mlayer=�[0msha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2 �[36mmanifest=�[0msha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa �[36mreason=�[0m&#34;jar: unidentified jar: jrt-fs.jar&#34; �[36mscanner=�[0mjava �[36mstate=�[0mScanLayers �[36mversion=�[0m6&#xA;�[90m2026-04-19T13:59:36Z�[0m �[32mINF�[0m �[1mlayers scan done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa �[36mstate=�[0mScanLayers&#xA;�[90m2026-04-19T13:59:36Z�[0m �[32mINF�[0m �[1mstarting index manifest�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa �[36mstate=�[0mIndexManifest&#xA;�[90m2026-04-19T13:59:36Z�[0m �[32mINF�[0m �[1mfinishing scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa �[36mstate=�[0mIndexFinished&#xA;�[90m2026-04-19T13:59:36Z�[0m �[32mINF�[0m �[1mmanifest successfully scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa �[36mstate=�[0mIndexFinished&#xA;�[90m2026-04-19T13:59:36Z�[0m �[32mINF�[0m �[1mindex request done�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa&#xA;{&#xA;  &#34;manifest_hash&#34;: &#34;sha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa&#34;,&#xA;  &#34;packages&#34;: {&#xA;    &#34;+XM+s3niWaEk1U5jnR5DpA==&#34;: {&#xA;      &#34;id&#34;: &#34;+XM+s3niWaEk1U5jnR5DpA==&#34;,&#xA;      &#34;name&#34;: &#34;libyaml&#34;,&#xA;      &#34;version&#34;: &#34;0.1.7-5.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libyaml&#34;,&#xA;        &#34;version&#34;: &#34;0.1.7-5.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+Xr7HyTxXf0c8jLaUyo3xA==&#34;: {&#xA;      &#34;id&#34;: &#34;+Xr7HyTxXf0c8jLaUyo3xA==&#34;,&#xA;      &#34;name&#34;: &#34;libidn2&#34;,&#xA;      &#34;version&#34;: &#34;2.2.0-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libidn2&#34;,&#xA;        &#34;version&#34;: &#34;2.2.0-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+hvIC0Et/RtHi7EAFCmfEw==&#34;: {&#xA;      &#34;id&#34;: &#34;+hvIC0Et/RtHi7EAFCmfEw==&#34;,&#xA;      &#34;name&#34;: &#34;file-libs&#34;,&#xA;      &#34;version&#34;: &#34;5.33-27.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;file&#34;,&#xA;        &#34;version&#34;: &#34;5.33-27.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+qrxjVH7Im8eBfrz4h4P/w==&#34;: {&#xA;      &#34;id&#34;: &#34;+qrxjVH7Im8eBfrz4h4P/w==&#34;,&#xA;      &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;      &#34;version&#34;: &#34;2:4.6-23.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;        &#34;version&#34;: &#34;4.6-23.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/ji9IJ9FfNcwqVRbMWZshQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/ji9IJ9FfNcwqVRbMWZshQ==&#34;,&#xA;      &#34;name&#34;: &#34;nss-softokn-freebl&#34;,&#xA;      &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nss&#34;,&#xA;        &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0+9x6aIRcNDCM7R94cpzew==&#34;: {&#xA;      &#34;id&#34;: &#34;0+9x6aIRcNDCM7R94cpzew==&#34;,&#xA;      &#34;name&#34;: &#34;java-17-openjdk-headless&#34;,&#xA;      &#34;version&#34;: &#34;1:17.0.18.0.8-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;17.0.18.0.8-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1gormAsAjMuks2JveQRd0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;1gormAsAjMuks2JveQRd0Q==&#34;,&#xA;      &#34;name&#34;: &#34;gobject-introspection&#34;,&#xA;      &#34;version&#34;: &#34;1.56.1-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gobject-introspection&#34;,&#xA;        &#34;version&#34;: &#34;1.56.1-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;22yBCZl99yVP86UHT7jTdw==&#34;: {&#xA;      &#34;id&#34;: &#34;22yBCZl99yVP86UHT7jTdw==&#34;,&#xA;      &#34;name&#34;: &#34;tzdata&#34;,&#xA;      &#34;version&#34;: &#34;2026a-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tzdata&#34;,&#xA;        &#34;version&#34;: &#34;2026a-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2PBlaOceApWEi634ZUHO/g==&#34;: {&#xA;      &#34;id&#34;: &#34;2PBlaOceApWEi634ZUHO/g==&#34;,&#xA;      &#34;name&#34;: &#34;platform-python&#34;,&#xA;      &#34;version&#34;: &#34;3.6.8-75.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;3.6.8-75.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3+d+oaGDGj9g2+1RFZjY5A==&#34;: {&#xA;      &#34;id&#34;: &#34;3+d+oaGDGj9g2+1RFZjY5A==&#34;,&#xA;      &#34;name&#34;: &#34;gmp&#34;,&#xA;      &#34;version&#34;: &#34;1:6.1.2-11.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gmp&#34;,&#xA;        &#34;version&#34;: &#34;6.1.2-11.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3OVNevSm98h4f1fmX4IZwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;3OVNevSm98h4f1fmX4IZwQ==&#34;,&#xA;      &#34;name&#34;: &#34;org.example:simple-java-project&#34;,&#xA;      &#34;version&#34;: &#34;1.0-SNAPSHOT&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3jI2apoRMNGhHa141Q5dlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;3jI2apoRMNGhHa141Q5dlQ==&#34;,&#xA;      &#34;name&#34;: &#34;libksba&#34;,&#xA;      &#34;version&#34;: &#34;1.3.5-9.el8_7&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libksba&#34;,&#xA;        &#34;version&#34;: &#34;1.3.5-9.el8_7&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3uSX4NgBxQvC8LEk48QoOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;3uSX4NgBxQvC8LEk48QoOQ==&#34;,&#xA;      &#34;name&#34;: &#34;cyrus-sasl-lib&#34;,&#xA;      &#34;version&#34;: &#34;2.1.27-6.el8_5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cyrus-sasl&#34;,&#xA;        &#34;version&#34;: &#34;2.1.27-6.el8_5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;45rvgYmy022Tx6fVWfking==&#34;: {&#xA;      &#34;id&#34;: &#34;45rvgYmy022Tx6fVWfking==&#34;,&#xA;      &#34;name&#34;: &#34;publicsuffix-list-dafsa&#34;,&#xA;      &#34;version&#34;: &#34;20180723-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;publicsuffix-list&#34;,&#xA;        &#34;version&#34;: &#34;20180723-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;47OMpR7yEmE4lttsyWq3fw==&#34;: {&#xA;      &#34;id&#34;: &#34;47OMpR7yEmE4lttsyWq3fw==&#34;,&#xA;      &#34;name&#34;: &#34;libusbx&#34;,&#xA;      &#34;version&#34;: &#34;1.0.23-4.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libusbx&#34;,&#xA;        &#34;version&#34;: &#34;1.0.23-4.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4ZgMXaHDWnwPnqKlcJzEIw==&#34;: {&#xA;      &#34;id&#34;: &#34;4ZgMXaHDWnwPnqKlcJzEIw==&#34;,&#xA;      &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.18.2-32.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.2-32.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4flTdmUV4iK1Ax+LXJm8qQ==&#34;: {&#xA;      &#34;id&#34;: &#34;4flTdmUV4iK1Ax+LXJm8qQ==&#34;,&#xA;      &#34;name&#34;: &#34;gnutls&#34;,&#xA;      &#34;version&#34;: &#34;3.6.16-8.el8_10.5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;3.6.16-8.el8_10.5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4sG4bBloak5Sz907ZDRs6Q==&#34;: {&#xA;      &#34;id&#34;: &#34;4sG4bBloak5Sz907ZDRs6Q==&#34;,&#xA;      &#34;name&#34;: &#34;libnsl2&#34;,&#xA;      &#34;version&#34;: &#34;1.2.0-2.20180605git4a062cf.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libnsl2&#34;,&#xA;        &#34;version&#34;: &#34;1.2.0-2.20180605git4a062cf.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4uQuJg+li+gGAwnGRDcs+w==&#34;: {&#xA;      &#34;id&#34;: &#34;4uQuJg+li+gGAwnGRDcs+w==&#34;,&#xA;      &#34;name&#34;: &#34;nss&#34;,&#xA;      &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nss&#34;,&#xA;        &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5U8sNbKx0xZsaHcVt4MmxA==&#34;: {&#xA;      &#34;id&#34;: &#34;5U8sNbKx0xZsaHcVt4MmxA==&#34;,&#xA;      &#34;name&#34;: &#34;chkconfig&#34;,&#xA;      &#34;version&#34;: &#34;1.19.2-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;chkconfig&#34;,&#xA;        &#34;version&#34;: &#34;1.19.2-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;67DLnC895xbDFuD3MGhCtQ==&#34;: {&#xA;      &#34;id&#34;: &#34;67DLnC895xbDFuD3MGhCtQ==&#34;,&#xA;      &#34;name&#34;: &#34;io.github.stuartwdouglas.hacbs-test.simple:simple-jdk8&#34;,&#xA;      &#34;version&#34;: &#34;1.2.4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6KnijwRsfeerWmf5Zl8NWw==&#34;: {&#xA;      &#34;id&#34;: &#34;6KnijwRsfeerWmf5Zl8NWw==&#34;,&#xA;      &#34;name&#34;: &#34;sed&#34;,&#xA;      &#34;version&#34;: &#34;4.5-5.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sed&#34;,&#xA;        &#34;version&#34;: &#34;4.5-5.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7eg89eCgA75bJ7WhhN/T4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;7eg89eCgA75bJ7WhhN/T4Q==&#34;,&#xA;      &#34;name&#34;: &#34;libtasn1&#34;,&#xA;      &#34;version&#34;: &#34;4.13-5.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1&#34;,&#xA;        &#34;version&#34;: &#34;4.13-5.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9uhqFNTCJ7/bpzSlc7qCaQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9uhqFNTCJ7/bpzSlc7qCaQ==&#34;,&#xA;      &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;      &#34;version&#34;: &#34;1.8.5-7.el8_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;        &#34;version&#34;: &#34;1.8.5-7.el8_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AIs6pmCup5N9+6Ag6e2/og==&#34;: {&#xA;      &#34;id&#34;: &#34;AIs6pmCup5N9+6Ag6e2/og==&#34;,&#xA;      &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;      &#34;version&#34;: &#34;1:1.1.1k-15.el8_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;1.1.1k-15.el8_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AuC6XQzcU/5tB4luIfjLFg==&#34;: {&#xA;      &#34;id&#34;: &#34;AuC6XQzcU/5tB4luIfjLFg==&#34;,&#xA;      &#34;name&#34;: &#34;elfutils-libelf&#34;,&#xA;      &#34;version&#34;: &#34;0.190-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;elfutils&#34;,&#xA;        &#34;version&#34;: &#34;0.190-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AziZ1oGI+oDXVPzldKNj+w==&#34;: {&#xA;      &#34;id&#34;: &#34;AziZ1oGI+oDXVPzldKNj+w==&#34;,&#xA;      &#34;name&#34;: &#34;openldap&#34;,&#xA;      &#34;version&#34;: &#34;2.4.46-21.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openldap&#34;,&#xA;        &#34;version&#34;: &#34;2.4.46-21.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BPsD0kkdIoK3KQUZ5DpJjw==&#34;: {&#xA;      &#34;id&#34;: &#34;BPsD0kkdIoK3KQUZ5DpJjw==&#34;,&#xA;      &#34;name&#34;: &#34;dbus-libs&#34;,&#xA;      &#34;version&#34;: &#34;1:1.12.8-27.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dbus&#34;,&#xA;        &#34;version&#34;: &#34;1.12.8-27.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BmK1zIjr5KsuOODCYwxRCw==&#34;: {&#xA;      &#34;id&#34;: &#34;BmK1zIjr5KsuOODCYwxRCw==&#34;,&#xA;      &#34;name&#34;: &#34;libpsl&#34;,&#xA;      &#34;version&#34;: &#34;0.20.2-6.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpsl&#34;,&#xA;        &#34;version&#34;: &#34;0.20.2-6.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CbqHQON08ZsUvPS9XDaTFA==&#34;: {&#xA;      &#34;id&#34;: &#34;CbqHQON08ZsUvPS9XDaTFA==&#34;,&#xA;      &#34;name&#34;: &#34;rpm&#34;,&#xA;      &#34;version&#34;: &#34;4.14.3-32.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;4.14.3-32.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Cklbj7Y2kf3vqxqc0m1GHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Cklbj7Y2kf3vqxqc0m1GHQ==&#34;,&#xA;      &#34;name&#34;: &#34;librhsm&#34;,&#xA;      &#34;version&#34;: &#34;0.0.3-5.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;librhsm&#34;,&#xA;        &#34;version&#34;: &#34;0.0.3-5.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;D/ASdBsgxLNlG5Q8U7UPsQ==&#34;: {&#xA;      &#34;id&#34;: &#34;D/ASdBsgxLNlG5Q8U7UPsQ==&#34;,&#xA;      &#34;name&#34;: &#34;rootfiles&#34;,&#xA;      &#34;version&#34;: &#34;8.1-22.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rootfiles&#34;,&#xA;        &#34;version&#34;: &#34;8.1-22.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;D9iJYSwBt2n6JCuuNo2fKg==&#34;: {&#xA;      &#34;id&#34;: &#34;D9iJYSwBt2n6JCuuNo2fKg==&#34;,&#xA;      &#34;name&#34;: &#34;audit-libs&#34;,&#xA;      &#34;version&#34;: &#34;3.1.2-1.el8_10.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;audit&#34;,&#xA;        &#34;version&#34;: &#34;3.1.2-1.el8_10.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DV119Dw0W4RdsbJkdoHU9w==&#34;: {&#xA;      &#34;id&#34;: &#34;DV119Dw0W4RdsbJkdoHU9w==&#34;,&#xA;      &#34;name&#34;: &#34;curl&#34;,&#xA;      &#34;version&#34;: &#34;7.61.1-34.el8_10.11&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;7.61.1-34.el8_10.11&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DgyhtZBcSIlVmY6xC8s1mA==&#34;: {&#xA;      &#34;id&#34;: &#34;DgyhtZBcSIlVmY6xC8s1mA==&#34;,&#xA;      &#34;name&#34;: &#34;coreutils-single&#34;,&#xA;      &#34;version&#34;: &#34;8.30-17.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;8.30-17.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EGfzPeF6a5hj9x4BwoN25A==&#34;: {&#xA;      &#34;id&#34;: &#34;EGfzPeF6a5hj9x4BwoN25A==&#34;,&#xA;      &#34;name&#34;: &#34;libcap&#34;,&#xA;      &#34;version&#34;: &#34;2.48-6.el8_9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap&#34;,&#xA;        &#34;version&#34;: &#34;2.48-6.el8_9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EiNiLT8ulizCzEWcybhizQ==&#34;: {&#xA;      &#34;id&#34;: &#34;EiNiLT8ulizCzEWcybhizQ==&#34;,&#xA;      &#34;name&#34;: &#34;lz4-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.8.3-5.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lz4&#34;,&#xA;        &#34;version&#34;: &#34;1.8.3-5.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;F7AOP7tK5AfUXV1g9iTzFA==&#34;: {&#xA;      &#34;id&#34;: &#34;F7AOP7tK5AfUXV1g9iTzFA==&#34;,&#xA;      &#34;name&#34;: &#34;mpfr&#34;,&#xA;      &#34;version&#34;: &#34;3.1.6-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;mpfr&#34;,&#xA;        &#34;version&#34;: &#34;3.1.6-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FS5/DAbDsXWURU9onlACPA==&#34;: {&#xA;      &#34;id&#34;: &#34;FS5/DAbDsXWURU9onlACPA==&#34;,&#xA;      &#34;name&#34;: &#34;alsa-lib&#34;,&#xA;      &#34;version&#34;: &#34;1.2.10-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;alsa-lib&#34;,&#xA;        &#34;version&#34;: &#34;1.2.10-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;G+gX+j4AbiCorxKiF1UojA==&#34;: {&#xA;      &#34;id&#34;: &#34;G+gX+j4AbiCorxKiF1UojA==&#34;,&#xA;      &#34;name&#34;: &#34;libsolv&#34;,&#xA;      &#34;version&#34;: &#34;0.7.20-6.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsolv&#34;,&#xA;        &#34;version&#34;: &#34;0.7.20-6.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GLKhGblbPbPbtDKwfpCv5A==&#34;: {&#xA;      &#34;id&#34;: &#34;GLKhGblbPbPbtDKwfpCv5A==&#34;,&#xA;      &#34;name&#34;: &#34;filesystem&#34;,&#xA;      &#34;version&#34;: &#34;3.8-6.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;filesystem&#34;,&#xA;        &#34;version&#34;: &#34;3.8-6.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Gg1Q6hponuT1eSJHwaJ83w==&#34;: {&#xA;      &#34;id&#34;: &#34;Gg1Q6hponuT1eSJHwaJ83w==&#34;,&#xA;      &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;      &#34;version&#34;: &#34;0.7.11-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;        &#34;version&#34;: &#34;0.7.11-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HMIoZ/TKrKhxI1rD26qmpw==&#34;: {&#xA;      &#34;id&#34;: &#34;HMIoZ/TKrKhxI1rD26qmpw==&#34;,&#xA;      &#34;name&#34;: &#34;json-c&#34;,&#xA;      &#34;version&#34;: &#34;0.13.1-3.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;json-c&#34;,&#xA;        &#34;version&#34;: &#34;0.13.1-3.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IzLcxZDtcvtJR5Gwdq9HDg==&#34;: {&#xA;      &#34;id&#34;: &#34;IzLcxZDtcvtJR5Gwdq9HDg==&#34;,&#xA;      &#34;name&#34;: &#34;libattr&#34;,&#xA;      &#34;version&#34;: &#34;2.4.48-3.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;attr&#34;,&#xA;        &#34;version&#34;: &#34;2.4.48-3.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;J34PJ2GThOWZuKVgFIoieA==&#34;: {&#xA;      &#34;id&#34;: &#34;J34PJ2GThOWZuKVgFIoieA==&#34;,&#xA;      &#34;name&#34;: &#34;zlib&#34;,&#xA;      &#34;version&#34;: &#34;1.2.11-25.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;1.2.11-25.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;JNDNKhJbFTSevs7EALfE9A==&#34;: {&#xA;      &#34;id&#34;: &#34;JNDNKhJbFTSevs7EALfE9A==&#34;,&#xA;      &#34;name&#34;: &#34;p11-kit&#34;,&#xA;      &#34;version&#34;: &#34;0.23.22-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;p11-kit&#34;,&#xA;        &#34;version&#34;: &#34;0.23.22-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;JvPeDbC4IianXNphFOy9jw==&#34;: {&#xA;      &#34;id&#34;: &#34;JvPeDbC4IianXNphFOy9jw==&#34;,&#xA;      &#34;name&#34;: &#34;openjdk-17-runtime-ubi8-container&#34;,&#xA;      &#34;version&#34;: &#34;1.23-4.1776047406&#34;,&#xA;      &#34;kind&#34;: &#34;source&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;rhctag:1.23.0.0.0.0.0.0.0.0&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LXiVkIlXLq/usMYIwCTH8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;LXiVkIlXLq/usMYIwCTH8Q==&#34;,&#xA;      &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;      &#34;version&#34;: &#34;2.32.1-48.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.32.1-48.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LkoLKEri5dIAb0vFMkSOag==&#34;: {&#xA;      &#34;id&#34;: &#34;LkoLKEri5dIAb0vFMkSOag==&#34;,&#xA;      &#34;name&#34;: &#34;glibc-common&#34;,&#xA;      &#34;version&#34;: &#34;2.28-251.el8_10.31&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.28-251.el8_10.31&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;N1RbIRo2SyHosQefv+skDw==&#34;: {&#xA;      &#34;id&#34;: &#34;N1RbIRo2SyHosQefv+skDw==&#34;,&#xA;      &#34;name&#34;: &#34;gawk&#34;,&#xA;      &#34;version&#34;: &#34;4.2.1-4.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gawk&#34;,&#xA;        &#34;version&#34;: &#34;4.2.1-4.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;N3ZaMrNJKoumMpaY0smlMQ==&#34;: {&#xA;      &#34;id&#34;: &#34;N3ZaMrNJKoumMpaY0smlMQ==&#34;,&#xA;      &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;      &#34;version&#34;: &#34;3.26.0-20.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;3.26.0-20.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;N5EuVcX6TPHBo7OPtax5uA==&#34;: {&#xA;      &#34;id&#34;: &#34;N5EuVcX6TPHBo7OPtax5uA==&#34;,&#xA;      &#34;name&#34;: &#34;crypto-policies-scripts&#34;,&#xA;      &#34;version&#34;: &#34;20230731-1.git3177e06.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;        &#34;version&#34;: &#34;20230731-1.git3177e06.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NJbhst8VIOwst++ZzRP6tA==&#34;: {&#xA;      &#34;id&#34;: &#34;NJbhst8VIOwst++ZzRP6tA==&#34;,&#xA;      &#34;name&#34;: &#34;libpeas&#34;,&#xA;      &#34;version&#34;: &#34;1.22.0-6.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpeas&#34;,&#xA;        &#34;version&#34;: &#34;1.22.0-6.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NguWV8S6YQYvQsGQDJm2Rg==&#34;: {&#xA;      &#34;id&#34;: &#34;NguWV8S6YQYvQsGQDJm2Rg==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-base&#34;,&#xA;      &#34;version&#34;: &#34;6.1-10.20180224.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.1-10.20180224.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NsvPyDc//39XTuXcn3j2uQ==&#34;: {&#xA;      &#34;id&#34;: &#34;NsvPyDc//39XTuXcn3j2uQ==&#34;,&#xA;      &#34;name&#34;: &#34;gdbm&#34;,&#xA;      &#34;version&#34;: &#34;1:1.18-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdbm&#34;,&#xA;        &#34;version&#34;: &#34;1.18-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ORsDK2A5479NPB0r01PoXQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ORsDK2A5479NPB0r01PoXQ==&#34;,&#xA;      &#34;name&#34;: &#34;libcurl&#34;,&#xA;      &#34;version&#34;: &#34;7.61.1-34.el8_10.11&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;7.61.1-34.el8_10.11&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;P5Se4zJpr8ZUwZNUojfuzA==&#34;: {&#xA;      &#34;id&#34;: &#34;P5Se4zJpr8ZUwZNUojfuzA==&#34;,&#xA;      &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;      &#34;version&#34;: &#34;4.1.1-6.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;        &#34;version&#34;: &#34;4.1.1-6.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;POPH5BJ/Q4Bfen05TT291g==&#34;: {&#xA;      &#34;id&#34;: &#34;POPH5BJ/Q4Bfen05TT291g==&#34;,&#xA;      &#34;name&#34;: &#34;nss-util&#34;,&#xA;      &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nss&#34;,&#xA;        &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Q0uPb/t/3IQ8GEwlv/J3Cw==&#34;: {&#xA;      &#34;id&#34;: &#34;Q0uPb/t/3IQ8GEwlv/J3Cw==&#34;,&#xA;      &#34;name&#34;: &#34;libmount&#34;,&#xA;      &#34;version&#34;: &#34;2.32.1-48.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.32.1-48.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QC6e3OaV78mjs678tGU2KQ==&#34;: {&#xA;      &#34;id&#34;: &#34;QC6e3OaV78mjs678tGU2KQ==&#34;,&#xA;      &#34;name&#34;: &#34;libssh&#34;,&#xA;      &#34;version&#34;: &#34;0.9.6-16.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;0.9.6-16.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QXEDMSZisv5SUXtJo7Fs5g==&#34;: {&#xA;      &#34;id&#34;: &#34;QXEDMSZisv5SUXtJo7Fs5g==&#34;,&#xA;      &#34;name&#34;: &#34;gpgme&#34;,&#xA;      &#34;version&#34;: &#34;1.13.1-12.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gpgme&#34;,&#xA;        &#34;version&#34;: &#34;1.13.1-12.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RKXYZTbYgViwzC05uqeDSg==&#34;: {&#xA;      &#34;id&#34;: &#34;RKXYZTbYgViwzC05uqeDSg==&#34;,&#xA;      &#34;name&#34;: &#34;io.github.stuartwdouglas.hacbs-test.simple:simple-jdk17&#34;,&#xA;      &#34;version&#34;: &#34;0.1.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RRWuvyUdhwGbBo2a/Ra1hw==&#34;: {&#xA;      &#34;id&#34;: &#34;RRWuvyUdhwGbBo2a/Ra1hw==&#34;,&#xA;      &#34;name&#34;: &#34;libselinux&#34;,&#xA;      &#34;version&#34;: &#34;2.9-11.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libselinux&#34;,&#xA;        &#34;version&#34;: &#34;2.9-11.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RtrzwDgrQgu9S5B72s2sww==&#34;: {&#xA;      &#34;id&#34;: &#34;RtrzwDgrQgu9S5B72s2sww==&#34;,&#xA;      &#34;name&#34;: &#34;libunistring&#34;,&#xA;      &#34;version&#34;: &#34;0.9.9-3.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libunistring&#34;,&#xA;        &#34;version&#34;: &#34;0.9.9-3.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;TARQvmsLVC/S1fQD1jO4Xw==&#34;: {&#xA;      &#34;id&#34;: &#34;TARQvmsLVC/S1fQD1jO4Xw==&#34;,&#xA;      &#34;name&#34;: &#34;gdbm-libs&#34;,&#xA;      &#34;version&#34;: &#34;1:1.18-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdbm&#34;,&#xA;        &#34;version&#34;: &#34;1.18-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;U3ZkYu9FoEzQITrVBlQtLA==&#34;: {&#xA;      &#34;id&#34;: &#34;U3ZkYu9FoEzQITrVBlQtLA==&#34;,&#xA;      &#34;name&#34;: &#34;glibc&#34;,&#xA;      &#34;version&#34;: &#34;2.28-251.el8_10.31&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.28-251.el8_10.31&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;USWNn71p+k059dbiu5HDEA==&#34;: {&#xA;      &#34;id&#34;: &#34;USWNn71p+k059dbiu5HDEA==&#34;,&#xA;      &#34;name&#34;: &#34;libassuan&#34;,&#xA;      &#34;version&#34;: &#34;2.5.1-3.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libassuan&#34;,&#xA;        &#34;version&#34;: &#34;2.5.1-3.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UUZyda9G/ffvF6rJ5W1UnQ==&#34;: {&#xA;      &#34;id&#34;: &#34;UUZyda9G/ffvF6rJ5W1UnQ==&#34;,&#xA;      &#34;name&#34;: &#34;libstdc++&#34;,&#xA;      &#34;version&#34;: &#34;8.5.0-28.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;8.5.0-28.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Vax934M9zGbzjdT3Y/XU9w==&#34;: {&#xA;      &#34;id&#34;: &#34;Vax934M9zGbzjdT3Y/XU9w==&#34;,&#xA;      &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;      &#34;version&#34;: &#34;2.28-251.el8_10.31&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.28-251.el8_10.31&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VrCmPwuY69qW5jl9ctxOZg==&#34;: {&#xA;      &#34;id&#34;: &#34;VrCmPwuY69qW5jl9ctxOZg==&#34;,&#xA;      &#34;name&#34;: &#34;libtirpc&#34;,&#xA;      &#34;version&#34;: &#34;1.1.4-12.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtirpc&#34;,&#xA;        &#34;version&#34;: &#34;1.1.4-12.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;W66WOQ3v6r7mSn6+o7gaew==&#34;: {&#xA;      &#34;id&#34;: &#34;W66WOQ3v6r7mSn6+o7gaew==&#34;,&#xA;      &#34;name&#34;: &#34;popt&#34;,&#xA;      &#34;version&#34;: &#34;1.18-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;popt&#34;,&#xA;        &#34;version&#34;: &#34;1.18-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Wq1n4jzKBPdL9z5l5HD99w==&#34;: {&#xA;      &#34;id&#34;: &#34;Wq1n4jzKBPdL9z5l5HD99w==&#34;,&#xA;      &#34;name&#34;: &#34;libarchive&#34;,&#xA;      &#34;version&#34;: &#34;3.3.3-6.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;3.3.3-6.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YjDcGmvP0/z8VqRiUvkhOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;YjDcGmvP0/z8VqRiUvkhOQ==&#34;,&#xA;      &#34;name&#34;: &#34;gnupg2&#34;,&#xA;      &#34;version&#34;: &#34;2.2.20-4.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;2.2.20-4.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Za0y7YiKRidyIBZNIzq/Ng==&#34;: {&#xA;      &#34;id&#34;: &#34;Za0y7YiKRidyIBZNIzq/Ng==&#34;,&#xA;      &#34;name&#34;: &#34;librepo&#34;,&#xA;      &#34;version&#34;: &#34;1.14.2-5.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;librepo&#34;,&#xA;        &#34;version&#34;: &#34;1.14.2-5.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ar0do80Wlk1FaVvtx66g6Q==&#34;: {&#xA;      &#34;id&#34;: &#34;ar0do80Wlk1FaVvtx66g6Q==&#34;,&#xA;      &#34;name&#34;: &#34;brotli&#34;,&#xA;      &#34;version&#34;: &#34;1.0.6-4.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;brotli&#34;,&#xA;        &#34;version&#34;: &#34;1.0.6-4.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;auI8KtI6OozP7EAIr9UlQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;auI8KtI6OozP7EAIr9UlQQ==&#34;,&#xA;      &#34;name&#34;: &#34;pcre2&#34;,&#xA;      &#34;version&#34;: &#34;10.32-3.el8_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;10.32-3.el8_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bWUdPEYmtshwdmuX5VapfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;bWUdPEYmtshwdmuX5VapfQ==&#34;,&#xA;      &#34;name&#34;: &#34;libblkid&#34;,&#xA;      &#34;version&#34;: &#34;2.32.1-48.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.32.1-48.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bmxL3lydQy0yU8g1iBgovg==&#34;: {&#xA;      &#34;id&#34;: &#34;bmxL3lydQy0yU8g1iBgovg==&#34;,&#xA;      &#34;name&#34;: &#34;libsepol&#34;,&#xA;      &#34;version&#34;: &#34;2.9-3.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;2.9-3.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cXCMP7NdkMDf1+Rb1IEktQ==&#34;: {&#xA;      &#34;id&#34;: &#34;cXCMP7NdkMDf1+Rb1IEktQ==&#34;,&#xA;      &#34;name&#34;: &#34;libsemanage&#34;,&#xA;      &#34;version&#34;: &#34;2.9-12.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsemanage&#34;,&#xA;        &#34;version&#34;: &#34;2.9-12.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dOBT1Qffq44NOVuk9chDyg==&#34;: {&#xA;      &#34;id&#34;: &#34;dOBT1Qffq44NOVuk9chDyg==&#34;,&#xA;      &#34;name&#34;: &#34;readline&#34;,&#xA;      &#34;version&#34;: &#34;7.0-10.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;readline&#34;,&#xA;        &#34;version&#34;: &#34;7.0-10.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dOwQwVL1NxmF6ouACZklrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dOwQwVL1NxmF6ouACZklrQ==&#34;,&#xA;      &#34;name&#34;: &#34;p11-kit-trust&#34;,&#xA;      &#34;version&#34;: &#34;0.23.22-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;p11-kit&#34;,&#xA;        &#34;version&#34;: &#34;0.23.22-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dSjxsaDISLUiFwRTCSO8Tg==&#34;: {&#xA;      &#34;id&#34;: &#34;dSjxsaDISLUiFwRTCSO8Tg==&#34;,&#xA;      &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;      &#34;version&#34;: &#34;20230731-1.git3177e06.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;        &#34;version&#34;: &#34;20230731-1.git3177e06.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dtGaxafuhIU1Ppty914fJw==&#34;: {&#xA;      &#34;id&#34;: &#34;dtGaxafuhIU1Ppty914fJw==&#34;,&#xA;      &#34;name&#34;: &#34;nspr&#34;,&#xA;      &#34;version&#34;: &#34;4.36.0-2.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nspr&#34;,&#xA;        &#34;version&#34;: &#34;4.36.0-2.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eZ7CwFvwDCQu4vzKyuIZgA==&#34;: {&#xA;      &#34;id&#34;: &#34;eZ7CwFvwDCQu4vzKyuIZgA==&#34;,&#xA;      &#34;name&#34;: &#34;basesystem&#34;,&#xA;      &#34;version&#34;: &#34;11-5.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;basesystem&#34;,&#xA;        &#34;version&#34;: &#34;11-5.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;f/Al/eNlUhjEgKSV0J2z7w==&#34;: {&#xA;      &#34;id&#34;: &#34;f/Al/eNlUhjEgKSV0J2z7w==&#34;,&#xA;      &#34;name&#34;: &#34;python3-pip-wheel&#34;,&#xA;      &#34;version&#34;: &#34;9.0.3-24.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;9.0.3-24.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;f1lteJj1IxLDbDb+BI8yjg==&#34;: {&#xA;      &#34;id&#34;: &#34;f1lteJj1IxLDbDb+BI8yjg==&#34;,&#xA;      &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;      &#34;version&#34;: &#34;2025.2.80_v9.0.304-80.2.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;        &#34;version&#34;: &#34;2025.2.80_v9.0.304-80.2.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;g146nKetkX1f4hfH1b5RWA==&#34;: {&#xA;      &#34;id&#34;: &#34;g146nKetkX1f4hfH1b5RWA==&#34;,&#xA;      &#34;name&#34;: &#34;libdb&#34;,&#xA;      &#34;version&#34;: &#34;5.3.28-42.el8_4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libdb&#34;,&#xA;        &#34;version&#34;: &#34;5.3.28-42.el8_4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gMqsUnRclTj6iuxHCslNRA==&#34;: {&#xA;      &#34;id&#34;: &#34;gMqsUnRclTj6iuxHCslNRA==&#34;,&#xA;      &#34;name&#34;: &#34;libdnf&#34;,&#xA;      &#34;version&#34;: &#34;0.63.0-21.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libdnf&#34;,&#xA;        &#34;version&#34;: &#34;0.63.0-21.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gOaN4treTmKK7tU+N6AZ1w==&#34;: {&#xA;      &#34;id&#34;: &#34;gOaN4treTmKK7tU+N6AZ1w==&#34;,&#xA;      &#34;name&#34;: &#34;pcre&#34;,&#xA;      &#34;version&#34;: &#34;8.42-6.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre&#34;,&#xA;        &#34;version&#34;: &#34;8.42-6.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gtbMsmX05ZWh+bkM1Wprlw==&#34;: {&#xA;      &#34;id&#34;: &#34;gtbMsmX05ZWh+bkM1Wprlw==&#34;,&#xA;      &#34;name&#34;: &#34;bash&#34;,&#xA;      &#34;version&#34;: &#34;4.4.20-6.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bash&#34;,&#xA;        &#34;version&#34;: &#34;4.4.20-6.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;h53SWWmMQUh4cLyBmYeNvw==&#34;: {&#xA;      &#34;id&#34;: &#34;h53SWWmMQUh4cLyBmYeNvw==&#34;,&#xA;      &#34;name&#34;: &#34;avahi-libs&#34;,&#xA;      &#34;version&#34;: &#34;0.7-27.el8_10.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;0.7-27.el8_10.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hSTTMcRX1DBcXc+8jKeg3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;hSTTMcRX1DBcXc+8jKeg3Q==&#34;,&#xA;      &#34;name&#34;: &#34;libgcc&#34;,&#xA;      &#34;version&#34;: &#34;8.5.0-28.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;8.5.0-28.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hcJqCsCpWm+XI9JT6ImS5g==&#34;: {&#xA;      &#34;id&#34;: &#34;hcJqCsCpWm+XI9JT6ImS5g==&#34;,&#xA;      &#34;name&#34;: &#34;nettle&#34;,&#xA;      &#34;version&#34;: &#34;3.4.1-7.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nettle&#34;,&#xA;        &#34;version&#34;: &#34;3.4.1-7.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;isPl2YxnCTfcLmUYH6Q0sA==&#34;: {&#xA;      &#34;id&#34;: &#34;isPl2YxnCTfcLmUYH6Q0sA==&#34;,&#xA;      &#34;name&#34;: &#34;libuuid&#34;,&#xA;      &#34;version&#34;: &#34;2.32.1-48.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.32.1-48.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;j5YRt82iOHry4ndSyCLgaA==&#34;: {&#xA;      &#34;id&#34;: &#34;j5YRt82iOHry4ndSyCLgaA==&#34;,&#xA;      &#34;name&#34;: &#34;cups-libs&#34;,&#xA;      &#34;version&#34;: &#34;1:2.2.6-67.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;2.2.6-67.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jSeaYCeiTMhbTniYmwK8dQ==&#34;: {&#xA;      &#34;id&#34;: &#34;jSeaYCeiTMhbTniYmwK8dQ==&#34;,&#xA;      &#34;name&#34;: &#34;python3-libs&#34;,&#xA;      &#34;version&#34;: &#34;3.6.8-75.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;3.6.8-75.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jmNxyfDM4IV/F4mrfNTfyg==&#34;: {&#xA;      &#34;id&#34;: &#34;jmNxyfDM4IV/F4mrfNTfyg==&#34;,&#xA;      &#34;name&#34;: &#34;setup&#34;,&#xA;      &#34;version&#34;: &#34;2.12.2-9.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setup&#34;,&#xA;        &#34;version&#34;: &#34;2.12.2-9.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jtdCxL/eH5JTPcKstKunJg==&#34;: {&#xA;      &#34;id&#34;: &#34;jtdCxL/eH5JTPcKstKunJg==&#34;,&#xA;      &#34;name&#34;: &#34;grep&#34;,&#xA;      &#34;version&#34;: &#34;3.1-6.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;grep&#34;,&#xA;        &#34;version&#34;: &#34;3.1-6.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;k/BpvWmZ5EVfmiPqpZ3pGw==&#34;: {&#xA;      &#34;id&#34;: &#34;k/BpvWmZ5EVfmiPqpZ3pGw==&#34;,&#xA;      &#34;name&#34;: &#34;expat&#34;,&#xA;      &#34;version&#34;: &#34;2.5.0-1.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;2.5.0-1.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;k4gCNgIfg7MM/e42ThRx2w==&#34;: {&#xA;      &#34;id&#34;: &#34;k4gCNgIfg7MM/e42ThRx2w==&#34;,&#xA;      &#34;name&#34;: &#34;libzstd&#34;,&#xA;      &#34;version&#34;: &#34;1.4.4-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zstd&#34;,&#xA;        &#34;version&#34;: &#34;1.4.4-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ka4b0+TZOGmroTz/rrRQcg==&#34;: {&#xA;      &#34;id&#34;: &#34;ka4b0+TZOGmroTz/rrRQcg==&#34;,&#xA;      &#34;name&#34;: &#34;nss-softokn&#34;,&#xA;      &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nss&#34;,&#xA;        &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kwc9NYOQig+qWs5qmBRL/w==&#34;: {&#xA;      &#34;id&#34;: &#34;kwc9NYOQig+qWs5qmBRL/w==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-libs&#34;,&#xA;      &#34;version&#34;: &#34;6.1-10.20180224.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.1-10.20180224.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lEFbOzBTlWwCqC/ZbjJfgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lEFbOzBTlWwCqC/ZbjJfgQ==&#34;,&#xA;      &#34;name&#34;: &#34;python3-setuptools-wheel&#34;,&#xA;      &#34;version&#34;: &#34;39.2.0-9.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-setuptools&#34;,&#xA;        &#34;version&#34;: &#34;39.2.0-9.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lU0MYRg2dg5wynl2dMGsgA==&#34;: {&#xA;      &#34;id&#34;: &#34;lU0MYRg2dg5wynl2dMGsgA==&#34;,&#xA;      &#34;name&#34;: &#34;xz-libs&#34;,&#xA;      &#34;version&#34;: &#34;5.2.4-4.el8_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz&#34;,&#xA;        &#34;version&#34;: &#34;5.2.4-4.el8_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mAmp7BtGrfzV0HnAKw9sTw==&#34;: {&#xA;      &#34;id&#34;: &#34;mAmp7BtGrfzV0HnAKw9sTw==&#34;,&#xA;      &#34;name&#34;: &#34;libsigsegv&#34;,&#xA;      &#34;version&#34;: &#34;2.11-5.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsigsegv&#34;,&#xA;        &#34;version&#34;: &#34;2.11-5.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mLwCNKs2wEtLWAiibtR4BQ==&#34;: {&#xA;      &#34;id&#34;: &#34;mLwCNKs2wEtLWAiibtR4BQ==&#34;,&#xA;      &#34;name&#34;: &#34;microdnf&#34;,&#xA;      &#34;version&#34;: &#34;3.8.0-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;microdnf&#34;,&#xA;        &#34;version&#34;: &#34;3.8.0-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mkpeQMTn6iNiF+ShBe+oZg==&#34;: {&#xA;      &#34;id&#34;: &#34;mkpeQMTn6iNiF+ShBe+oZg==&#34;,&#xA;      &#34;name&#34;: &#34;libverto&#34;,&#xA;      &#34;version&#34;: &#34;0.3.2-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libverto&#34;,&#xA;        &#34;version&#34;: &#34;0.3.2-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mtrWxjnWyzrIFOuHVeUG6g==&#34;: {&#xA;      &#34;id&#34;: &#34;mtrWxjnWyzrIFOuHVeUG6g==&#34;,&#xA;      &#34;name&#34;: &#34;tar&#34;,&#xA;      &#34;version&#34;: &#34;2:1.30-11.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;1.30-11.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nDtLoMnkuhspYDn7NZEcjw==&#34;: {&#xA;      &#34;id&#34;: &#34;nDtLoMnkuhspYDn7NZEcjw==&#34;,&#xA;      &#34;name&#34;: &#34;findutils&#34;,&#xA;      &#34;version&#34;: &#34;1:4.6.0-24.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;findutils&#34;,&#xA;        &#34;version&#34;: &#34;4.6.0-24.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;o4v1nyEgxKUJdf78CSzLEg==&#34;: {&#xA;      &#34;id&#34;: &#34;o4v1nyEgxKUJdf78CSzLEg==&#34;,&#xA;      &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;      &#34;version&#34;: &#34;1.31-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;        &#34;version&#34;: &#34;1.31-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;oPxhGBL0xk+N4XwwxvflAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;oPxhGBL0xk+N4XwwxvflAQ==&#34;,&#xA;      &#34;name&#34;: &#34;redhat-release&#34;,&#xA;      &#34;version&#34;: &#34;8.10-0.3.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;redhat-release&#34;,&#xA;        &#34;version&#34;: &#34;8.10-0.3.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;oSDtB9GflLljTYeOAikyIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;oSDtB9GflLljTYeOAikyIQ==&#34;,&#xA;      &#34;name&#34;: &#34;glib2&#34;,&#xA;      &#34;version&#34;: &#34;2.56.4-168.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;2.56.4-168.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;p9tXHgTBVU/b3sTnwfubzg==&#34;: {&#xA;      &#34;id&#34;: &#34;p9tXHgTBVU/b3sTnwfubzg==&#34;,&#xA;      &#34;name&#34;: &#34;libdb-utils&#34;,&#xA;      &#34;version&#34;: &#34;5.3.28-42.el8_4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libdb&#34;,&#xA;        &#34;version&#34;: &#34;5.3.28-42.el8_4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pY2NT/GP1UxyOuAl2rKgCw==&#34;: {&#xA;      &#34;id&#34;: &#34;pY2NT/GP1UxyOuAl2rKgCw==&#34;,&#xA;      &#34;name&#34;: &#34;npth&#34;,&#xA;      &#34;version&#34;: &#34;1.5-4.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npth&#34;,&#xA;        &#34;version&#34;: &#34;1.5-4.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;peUaHHW4E9Y6Nd8+gJR5cQ==&#34;: {&#xA;      &#34;id&#34;: &#34;peUaHHW4E9Y6Nd8+gJR5cQ==&#34;,&#xA;      &#34;name&#34;: &#34;libssh-config&#34;,&#xA;      &#34;version&#34;: &#34;0.9.6-16.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;0.9.6-16.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pp9zZ0tBoevZ/s15eFRL8g==&#34;: {&#xA;      &#34;id&#34;: &#34;pp9zZ0tBoevZ/s15eFRL8g==&#34;,&#xA;      &#34;name&#34;: &#34;libacl&#34;,&#xA;      &#34;version&#34;: &#34;2.2.53-3.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;acl&#34;,&#xA;        &#34;version&#34;: &#34;2.2.53-3.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;q4X/5GGPJSNoqWY61ewdVA==&#34;: {&#xA;      &#34;id&#34;: &#34;q4X/5GGPJSNoqWY61ewdVA==&#34;,&#xA;      &#34;name&#34;: &#34;tzdata-java&#34;,&#xA;      &#34;version&#34;: &#34;2026a-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tzdata&#34;,&#xA;        &#34;version&#34;: &#34;2026a-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;r23nOnTJvuvXzj0P21ldlw==&#34;: {&#xA;      &#34;id&#34;: &#34;r23nOnTJvuvXzj0P21ldlw==&#34;,&#xA;      &#34;name&#34;: &#34;rpm-libs&#34;,&#xA;      &#34;version&#34;: &#34;4.14.3-32.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;4.14.3-32.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rFsA2fU/SFo3JGOkxRURTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rFsA2fU/SFo3JGOkxRURTQ==&#34;,&#xA;      &#34;name&#34;: &#34;keyutils-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.5.10-9.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;keyutils&#34;,&#xA;        &#34;version&#34;: &#34;1.5.10-9.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sMrsZHOrW8FfprPHZo6Jww==&#34;: {&#xA;      &#34;id&#34;: &#34;sMrsZHOrW8FfprPHZo6Jww==&#34;,&#xA;      &#34;name&#34;: &#34;libmodulemd&#34;,&#xA;      &#34;version&#34;: &#34;2.13.0-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libmodulemd&#34;,&#xA;        &#34;version&#34;: &#34;2.13.0-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sUhkiUesE2DHTU1IF7t+tw==&#34;: {&#xA;      &#34;id&#34;: &#34;sUhkiUesE2DHTU1IF7t+tw==&#34;,&#xA;      &#34;name&#34;: &#34;platform-python-setuptools&#34;,&#xA;      &#34;version&#34;: &#34;39.2.0-9.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-setuptools&#34;,&#xA;        &#34;version&#34;: &#34;39.2.0-9.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;trIX86+UkjuJsaeYfHvnYw==&#34;: {&#xA;      &#34;id&#34;: &#34;trIX86+UkjuJsaeYfHvnYw==&#34;,&#xA;      &#34;name&#34;: &#34;libnghttp2&#34;,&#xA;      &#34;version&#34;: &#34;1.33.0-6.el8_10.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nghttp2&#34;,&#xA;        &#34;version&#34;: &#34;1.33.0-6.el8_10.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u25cfo+Wn6RpzVY/kgcoGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;u25cfo+Wn6RpzVY/kgcoGQ==&#34;,&#xA;      &#34;name&#34;: &#34;lksctp-tools&#34;,&#xA;      &#34;version&#34;: &#34;1.0.18-3.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lksctp-tools&#34;,&#xA;        &#34;version&#34;: &#34;1.0.18-3.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uAJuv5cA4XPhcDfjrdFI9w==&#34;: {&#xA;      &#34;id&#34;: &#34;uAJuv5cA4XPhcDfjrdFI9w==&#34;,&#xA;      &#34;name&#34;: &#34;javapackages-filesystem&#34;,&#xA;      &#34;version&#34;: &#34;5.3.0-1.module+el8+2447+6f56d9a6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;javapackages-tools&#34;,&#xA;        &#34;version&#34;: &#34;5.3.0-1.module+el8+2447+6f56d9a6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;module&#34;: &#34;javapackages-runtime:201801&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;module&#34;: &#34;javapackages-runtime:201801&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uCw7c1p0VzVV36rFL2/j4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;uCw7c1p0VzVV36rFL2/j4Q==&#34;,&#xA;      &#34;name&#34;: &#34;bzip2-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.0.6-28.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bzip2&#34;,&#xA;        &#34;version&#34;: &#34;1.0.6-28.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;v/KoDsdxOHqLHd7du8yyWQ==&#34;: {&#xA;      &#34;id&#34;: &#34;v/KoDsdxOHqLHd7du8yyWQ==&#34;,&#xA;      &#34;name&#34;: &#34;lua-libs&#34;,&#xA;      &#34;version&#34;: &#34;5.3.4-12.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lua&#34;,&#xA;        &#34;version&#34;: &#34;5.3.4-12.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;v4V8PzD9YS+9p+1g+BPsfA==&#34;: {&#xA;      &#34;id&#34;: &#34;v4V8PzD9YS+9p+1g+BPsfA==&#34;,&#xA;      &#34;name&#34;: &#34;ubi8/openjdk-17-runtime&#34;,&#xA;      &#34;version&#34;: &#34;1.23-4.1776047406&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;JvPeDbC4IianXNphFOy9jw==&#34;,&#xA;        &#34;name&#34;: &#34;openjdk-17-runtime-ubi8-container&#34;,&#xA;        &#34;version&#34;: &#34;1.23-4.1776047406&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;source&#34;: {&#xA;          &#34;id&#34;: &#34;&#34;,&#xA;          &#34;name&#34;: &#34;&#34;,&#xA;          &#34;version&#34;: &#34;&#34;,&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;normalized_version&#34;: &#34;rhctag:1.23.0.0.0.0.0.0.0.0&#34;,&#xA;        &#34;arch&#34;: &#34;x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;rhctag:1.23.0.0.0.0.0.0.0.0&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wQToP4WURQ4/A8LQU1k5kA==&#34;: {&#xA;      &#34;id&#34;: &#34;wQToP4WURQ4/A8LQU1k5kA==&#34;,&#xA;      &#34;name&#34;: &#34;langpacks-en&#34;,&#xA;      &#34;version&#34;: &#34;1.0-12.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;langpacks&#34;,&#xA;        &#34;version&#34;: &#34;1.0-12.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wiX2z3C4urSDsP+bIajgNg==&#34;: {&#xA;      &#34;id&#34;: &#34;wiX2z3C4urSDsP+bIajgNg==&#34;,&#xA;      &#34;name&#34;: &#34;io.github.stuartwdouglas.hacbs-test.shaded:shaded-jdk11&#34;,&#xA;      &#34;version&#34;: &#34;1.9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wpJmhjYJz5TYuh0mbRPs4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;wpJmhjYJz5TYuh0mbRPs4Q==&#34;,&#xA;      &#34;name&#34;: &#34;info&#34;,&#xA;      &#34;version&#34;: &#34;6.5-7.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;texinfo&#34;,&#xA;        &#34;version&#34;: &#34;6.5-7.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xDLbw0lNdZ2pSj9R8k9t6A==&#34;: {&#xA;      &#34;id&#34;: &#34;xDLbw0lNdZ2pSj9R8k9t6A==&#34;,&#xA;      &#34;name&#34;: &#34;copy-jdk-configs&#34;,&#xA;      &#34;version&#34;: &#34;4.0-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;copy-jdk-configs&#34;,&#xA;        &#34;version&#34;: &#34;4.0-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xTF9l16G3x26txeCsO9Bug==&#34;: {&#xA;      &#34;id&#34;: &#34;xTF9l16G3x26txeCsO9Bug==&#34;,&#xA;      &#34;name&#34;: &#34;json-glib&#34;,&#xA;      &#34;version&#34;: &#34;1.4.4-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;json-glib&#34;,&#xA;        &#34;version&#34;: &#34;1.4.4-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xY/gcEds28iVWCynxOCw9g==&#34;: {&#xA;      &#34;id&#34;: &#34;xY/gcEds28iVWCynxOCw9g==&#34;,&#xA;      &#34;name&#34;: &#34;libcom_err&#34;,&#xA;      &#34;version&#34;: &#34;1.45.6-7.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.45.6-7.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xvIYCTeML23osZxD1kFItQ==&#34;: {&#xA;      &#34;id&#34;: &#34;xvIYCTeML23osZxD1kFItQ==&#34;,&#xA;      &#34;name&#34;: &#34;lua&#34;,&#xA;      &#34;version&#34;: &#34;5.3.4-12.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lua&#34;,&#xA;        &#34;version&#34;: &#34;5.3.4-12.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;y1KXv1Wa0o6q+5/jJ4FmmA==&#34;: {&#xA;      &#34;id&#34;: &#34;y1KXv1Wa0o6q+5/jJ4FmmA==&#34;,&#xA;      &#34;name&#34;: &#34;libxml2&#34;,&#xA;      &#34;version&#34;: &#34;2.9.7-21.el8_10.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;2.9.7-21.el8_10.3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yI01txXPQZENPfjF45L+Zw==&#34;: {&#xA;      &#34;id&#34;: &#34;yI01txXPQZENPfjF45L+Zw==&#34;,&#xA;      &#34;name&#34;: &#34;nss-sysinit&#34;,&#xA;      &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nss&#34;,&#xA;        &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yX08xXm2MSxk7s6Ui2Z6BQ==&#34;: {&#xA;      &#34;id&#34;: &#34;yX08xXm2MSxk7s6Ui2Z6BQ==&#34;,&#xA;      &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;      &#34;version&#34;: &#34;239-82.el8_10.15&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;239-82.el8_10.15&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zAReYdYoHUkp8wr8i3SW2g==&#34;: {&#xA;      &#34;id&#34;: &#34;zAReYdYoHUkp8wr8i3SW2g==&#34;,&#xA;      &#34;name&#34;: &#34;libffi&#34;,&#xA;      &#34;version&#34;: &#34;3.1-24.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libffi&#34;,&#xA;        &#34;version&#34;: &#34;3.1-24.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;distributions&#34;: {&#xA;    &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;: {&#xA;      &#34;id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;      &#34;did&#34;: &#34;rhel&#34;,&#xA;      &#34;name&#34;: &#34;Red Hat Enterprise Linux Server&#34;,&#xA;      &#34;version&#34;: &#34;8&#34;,&#xA;      &#34;version_code_name&#34;: &#34;&#34;,&#xA;      &#34;version_id&#34;: &#34;8&#34;,&#xA;      &#34;arch&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;      &#34;pretty_name&#34;: &#34;Red Hat Enterprise Linux Server 8&#34;&#xA;    }&#xA;  },&#xA;  &#34;repository&#34;: {&#xA;    &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;: {&#xA;      &#34;id&#34;: &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/a:redhat:enterprise_linux:8::appstream&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:8:*:appstream:*:*:*:*:*&#34;&#xA;    },&#xA;    &#34;6a791925-d1d7-477a-99c5-c66cb7376b16&#34;: {&#xA;      &#34;id&#34;: &#34;6a791925-d1d7-477a-99c5-c66cb7376b16&#34;,&#xA;      &#34;name&#34;: &#34;Red Hat Container Catalog&#34;,&#xA;      &#34;uri&#34;: &#34;https://catalog.redhat.com/software/containers/explore&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;: {&#xA;      &#34;id&#34;: &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/a:redhat:enterprise_linux:8::appstream&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:8:*:appstream:*:*:*:*:*&#34;&#xA;    },&#xA;    &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;: {&#xA;      &#34;id&#34;: &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/o:redhat:enterprise_linux:8::baseos&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:baseos:*:*:*:*:*&#34;&#xA;    },&#xA;    &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;: {&#xA;      &#34;id&#34;: &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/o:redhat:enterprise_linux:8::baseos&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:baseos:*:*:*:*:*&#34;&#xA;    },&#xA;    &#34;ef06d13c-382d-4ffb-8d11-befc2ec3c83d&#34;: {&#xA;      &#34;id&#34;: &#34;ef06d13c-382d-4ffb-8d11-befc2ec3c83d&#34;,&#xA;      &#34;name&#34;: &#34;maven&#34;,&#xA;      &#34;uri&#34;: &#34;https://repo1.maven.apache.org/maven2&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;environments&#34;: {&#xA;    &#34;+XM+s3niWaEk1U5jnR5DpA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;+Xr7HyTxXf0c8jLaUyo3xA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;+hvIC0Et/RtHi7EAFCmfEw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;+qrxjVH7Im8eBfrz4h4P/w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;/ji9IJ9FfNcwqVRbMWZshQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;0+9x6aIRcNDCM7R94cpzew==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;1gormAsAjMuks2JveQRd0Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;22yBCZl99yVP86UHT7jTdw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;2PBlaOceApWEi634ZUHO/g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;3+d+oaGDGj9g2+1RFZjY5A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;3OVNevSm98h4f1fmX4IZwQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;maven:deployments/hacbs-test.jar&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:807257ccec3172d3ff00b01aec5eea4742716a67080bf366ef28bc0d071fe65e&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;ef06d13c-382d-4ffb-8d11-befc2ec3c83d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;3jI2apoRMNGhHa141Q5dlQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;3uSX4NgBxQvC8LEk48QoOQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;45rvgYmy022Tx6fVWfking==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;47OMpR7yEmE4lttsyWq3fw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;4ZgMXaHDWnwPnqKlcJzEIw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;4flTdmUV4iK1Ax+LXJm8qQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;4sG4bBloak5Sz907ZDRs6Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;4uQuJg+li+gGAwnGRDcs+w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;5U8sNbKx0xZsaHcVt4MmxA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;67DLnC895xbDFuD3MGhCtQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;maven:deployments/hacbs-test.jar&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:807257ccec3172d3ff00b01aec5eea4742716a67080bf366ef28bc0d071fe65e&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;ef06d13c-382d-4ffb-8d11-befc2ec3c83d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;6KnijwRsfeerWmf5Zl8NWw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;7eg89eCgA75bJ7WhhN/T4Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;9uhqFNTCJ7/bpzSlc7qCaQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;AIs6pmCup5N9+6Ag6e2/og==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;AuC6XQzcU/5tB4luIfjLFg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;AziZ1oGI+oDXVPzldKNj+w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;BPsD0kkdIoK3KQUZ5DpJjw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;BmK1zIjr5KsuOODCYwxRCw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;CbqHQON08ZsUvPS9XDaTFA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Cklbj7Y2kf3vqxqc0m1GHQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;D/ASdBsgxLNlG5Q8U7UPsQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;D9iJYSwBt2n6JCuuNo2fKg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;DV119Dw0W4RdsbJkdoHU9w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;DgyhtZBcSIlVmY6xC8s1mA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;EGfzPeF6a5hj9x4BwoN25A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;EiNiLT8ulizCzEWcybhizQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;F7AOP7tK5AfUXV1g9iTzFA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;FS5/DAbDsXWURU9onlACPA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;G+gX+j4AbiCorxKiF1UojA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;GLKhGblbPbPbtDKwfpCv5A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Gg1Q6hponuT1eSJHwaJ83w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;HMIoZ/TKrKhxI1rD26qmpw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;IzLcxZDtcvtJR5Gwdq9HDg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;J34PJ2GThOWZuKVgFIoieA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;JNDNKhJbFTSevs7EALfE9A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;JvPeDbC4IianXNphFOy9jw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;root/buildinfo/Dockerfile-ubi8-openjdk-17-runtime-1.23-4.1776047406&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;6a791925-d1d7-477a-99c5-c66cb7376b16&#34;,&#xA;          &#34;6a791925-d1d7-477a-99c5-c66cb7376b16&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;LXiVkIlXLq/usMYIwCTH8Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;LkoLKEri5dIAb0vFMkSOag==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;N1RbIRo2SyHosQefv+skDw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;N3ZaMrNJKoumMpaY0smlMQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;N5EuVcX6TPHBo7OPtax5uA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;NJbhst8VIOwst++ZzRP6tA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;NguWV8S6YQYvQsGQDJm2Rg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;NsvPyDc//39XTuXcn3j2uQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ORsDK2A5479NPB0r01PoXQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;P5Se4zJpr8ZUwZNUojfuzA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;POPH5BJ/Q4Bfen05TT291g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Q0uPb/t/3IQ8GEwlv/J3Cw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;QC6e3OaV78mjs678tGU2KQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;QXEDMSZisv5SUXtJo7Fs5g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;RKXYZTbYgViwzC05uqeDSg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;maven:deployments/hacbs-test.jar&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:807257ccec3172d3ff00b01aec5eea4742716a67080bf366ef28bc0d071fe65e&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;ef06d13c-382d-4ffb-8d11-befc2ec3c83d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;RRWuvyUdhwGbBo2a/Ra1hw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;RtrzwDgrQgu9S5B72s2sww==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;TARQvmsLVC/S1fQD1jO4Xw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;U3ZkYu9FoEzQITrVBlQtLA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;USWNn71p+k059dbiu5HDEA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;UUZyda9G/ffvF6rJ5W1UnQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Vax934M9zGbzjdT3Y/XU9w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;VrCmPwuY69qW5jl9ctxOZg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;W66WOQ3v6r7mSn6+o7gaew==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Wq1n4jzKBPdL9z5l5HD99w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;YjDcGmvP0/z8VqRiUvkhOQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Za0y7YiKRidyIBZNIzq/Ng==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ar0do80Wlk1FaVvtx66g6Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;auI8KtI6OozP7EAIr9UlQQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;bWUdPEYmtshwdmuX5VapfQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;bmxL3lydQy0yU8g1iBgovg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;cXCMP7NdkMDf1+Rb1IEktQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;dOBT1Qffq44NOVuk9chDyg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;dOwQwVL1NxmF6ouACZklrQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;dSjxsaDISLUiFwRTCSO8Tg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;dtGaxafuhIU1Ppty914fJw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;eZ7CwFvwDCQu4vzKyuIZgA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;f/Al/eNlUhjEgKSV0J2z7w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;f1lteJj1IxLDbDb+BI8yjg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;g146nKetkX1f4hfH1b5RWA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;gMqsUnRclTj6iuxHCslNRA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;gOaN4treTmKK7tU+N6AZ1w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;gtbMsmX05ZWh+bkM1Wprlw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;h53SWWmMQUh4cLyBmYeNvw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;hSTTMcRX1DBcXc+8jKeg3Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;hcJqCsCpWm+XI9JT6ImS5g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;isPl2YxnCTfcLmUYH6Q0sA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;j5YRt82iOHry4ndSyCLgaA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;jSeaYCeiTMhbTniYmwK8dQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;jmNxyfDM4IV/F4mrfNTfyg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;jtdCxL/eH5JTPcKstKunJg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;k/BpvWmZ5EVfmiPqpZ3pGw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;k4gCNgIfg7MM/e42ThRx2w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ka4b0+TZOGmroTz/rrRQcg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;kwc9NYOQig+qWs5qmBRL/w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;lEFbOzBTlWwCqC/ZbjJfgQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;lU0MYRg2dg5wynl2dMGsgA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;mAmp7BtGrfzV0HnAKw9sTw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;mLwCNKs2wEtLWAiibtR4BQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;mkpeQMTn6iNiF+ShBe+oZg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;mtrWxjnWyzrIFOuHVeUG6g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;nDtLoMnkuhspYDn7NZEcjw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;o4v1nyEgxKUJdf78CSzLEg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;oPxhGBL0xk+N4XwwxvflAQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;oSDtB9GflLljTYeOAikyIQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;p9tXHgTBVU/b3sTnwfubzg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;pY2NT/GP1UxyOuAl2rKgCw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;peUaHHW4E9Y6Nd8+gJR5cQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;pp9zZ0tBoevZ/s15eFRL8g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;q4X/5GGPJSNoqWY61ewdVA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;r23nOnTJvuvXzj0P21ldlw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;rFsA2fU/SFo3JGOkxRURTQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;sMrsZHOrW8FfprPHZo6Jww==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;sUhkiUesE2DHTU1IF7t+tw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;trIX86+UkjuJsaeYfHvnYw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;u25cfo+Wn6RpzVY/kgcoGQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;uAJuv5cA4XPhcDfjrdFI9w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;uCw7c1p0VzVV36rFL2/j4Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;v/KoDsdxOHqLHd7du8yyWQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;v4V8PzD9YS+9p+1g+BPsfA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;root/buildinfo/Dockerfile-ubi8-openjdk-17-runtime-1.23-4.1776047406&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;6a791925-d1d7-477a-99c5-c66cb7376b16&#34;,&#xA;          &#34;6a791925-d1d7-477a-99c5-c66cb7376b16&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;wQToP4WURQ4/A8LQU1k5kA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;wiX2z3C4urSDsP+bIajgNg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;maven:deployments/hacbs-test.jar&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:807257ccec3172d3ff00b01aec5eea4742716a67080bf366ef28bc0d071fe65e&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;ef06d13c-382d-4ffb-8d11-befc2ec3c83d&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;wpJmhjYJz5TYuh0mbRPs4Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;xDLbw0lNdZ2pSj9R8k9t6A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;xTF9l16G3x26txeCsO9Bug==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;xY/gcEds28iVWCynxOCw9g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;xvIYCTeML23osZxD1kFItQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;y1KXv1Wa0o6q+5/jJ4FmmA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;yI01txXPQZENPfjF45L+Zw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;5905d29d-21e0-425f-a8ee-2eac204d06aa&#34;,&#xA;          &#34;da5c3647-96f6-4c8d-b87b-57fb2b45ed32&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;yX08xXm2MSxk7s6Ui2Z6BQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;zAReYdYoHUkp8wr8i3SW2g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;a14107f4-03ad-4328-bafb-7308ece7b6dd&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;765b49cb-84ce-4f3e-a364-fadb53ba40dc&#34;,&#xA;          &#34;c5ab0220-6726-427d-922f-84173d6186b3&#34;&#xA;        ]&#xA;      }&#xA;    ]&#xA;  },&#xA;  &#34;vulnerabilities&#34;: {&#xA;    &#34;+nHq7dak7Hkjcru/xpwzhQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+nHq7dak7Hkjcru/xpwzhQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-12413&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Mozilla nss. A raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman(DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The highest threat from this vulnerability is to data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-09-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-12413 https://bugzilla.redhat.com/show_bug.cgi?id=1877557 https://www.cve.org/CVERecord?id=CVE-2020-12413 https://nvd.nist.gov/vuln/detail/CVE-2020-12413 https://raccoon-attack.com/RacoonAttack.pdf https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-12413.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nss&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/1CYFiexnJcM7p4YrI/FVg==&#34;: {&#xA;      &#34;id&#34;: &#34;/1CYFiexnJcM7p4YrI/FVg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4504&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in CUPS and libppd, where a failure to validate the length provided in an attacker-crafted PPD PostScript document can lead to a heap-based buffer overflow, causing a denial of service or, in some cases, execute arbitrary code, depending on how the application processes untrusted PPD files.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-20T12:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4504 https://bugzilla.redhat.com/show_bug.cgi?id=2238509 https://www.cve.org/CVERecord?id=CVE-2023-4504 https://nvd.nist.gov/vuln/detail/CVE-2023-4504 https://takeonme.org/cves/CVE-2023-4504.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4504.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/QaL/BUIdoF2MAB/C1YiGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/QaL/BUIdoF2MAB/C1YiGQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4424&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4424 https://bugzilla.redhat.com/show_bug.cgi?id=2449006 https://www.cve.org/CVERecord?id=CVE-2026-4424 https://nvd.nist.gov/vuln/detail/CVE-2026-4424 https://github.com/libarchive/libarchive/pull/2898 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4424.json https://access.redhat.com/errata/RHSA-2026:8534&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.3.3-7.el8_10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0QzoXQSqkKieJ7Oc+px0JA==&#34;: {&#xA;      &#34;id&#34;: &#34;0QzoXQSqkKieJ7Oc+px0JA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13837&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the plistlib module in the Python standard library. The amount of data to read from a Plist file is specified in the file itself. This issue allows a specially crafted Plist file to cause an application to allocate a large amount of memory, potentially resulting in allocations errors, swapping, out-of-memory conditions or even system freezes.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-01T18:13:32Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13837 https://bugzilla.redhat.com/show_bug.cgi?id=2418084 https://www.cve.org/CVERecord?id=CVE-2025-13837 https://nvd.nist.gov/vuln/detail/CVE-2025-13837 https://github.com/python/cpython/issues/119342 https://github.com/python/cpython/pull/119343 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13837.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0WTD6ZUY2Zj2w0R3oyPWRw==&#34;: {&#xA;      &#34;id&#34;: &#34;0WTD6ZUY2Zj2w0R3oyPWRw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34980&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenPrinting CUPS. An unauthorized client can exploit this vulnerability by sending a specially crafted print job to a shared PostScript queue without authentication. The server improperly handles the `page-border` value, allowing an attacker to embed and reparse malicious text as a trusted scheduler control record. This can lead to arbitrary code execution with the privileges of the &#39;lp&#39; user, potentially compromising the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-03T21:18:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34980 https://bugzilla.redhat.com/show_bug.cgi?id=2454954 https://www.cve.org/CVERecord?id=CVE-2026-34980 https://nvd.nist.gov/vuln/detail/CVE-2026-34980 https://github.com/OpenPrinting/cups/security/advisories/GHSA-4852-v58g-6cwf https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34980.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0fCtWwB6iclgRvIA+IqiJQ==&#34;: {&#xA;      &#34;id&#34;: &#34;0fCtWwB6iclgRvIA+IqiJQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1484&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1484 https://bugzilla.redhat.com/show_bug.cgi?id=2433259 https://www.cve.org/CVERecord?id=CVE-2026-1484 https://nvd.nist.gov/vuln/detail/CVE-2026-1484 https://gitlab.gnome.org/GNOME/glib/-/issues/3870 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1484.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0nQ3GJDLY22M176Z5ESg6A==&#34;: {&#xA;      &#34;id&#34;: &#34;0nQ3GJDLY22M176Z5ESg6A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68972&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. An adversary can exploit this vulnerability by crafting a signed message that includes a form feed character (\\f) at the end of a plaintext line. This allows the adversary to append additional, unsigned text to the message while the signature verification still reports success. This issue leads to an integrity bypass, potentially enabling the spoofing of signed communications.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-27T22:52:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68972 https://bugzilla.redhat.com/show_bug.cgi?id=2425646 https://www.cve.org/CVERecord?id=CVE-2025-68972 https://nvd.nist.gov/vuln/detail/CVE-2025-68972 https://gpg.fail/formfeed https://news.ycombinator.com/item?id=46404339 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68972.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1lUHOMB3ANHGWpqCBv9Ynw==&#34;: {&#xA;      &#34;id&#34;: &#34;1lUHOMB3ANHGWpqCBv9Ynw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4105&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4105 https://bugzilla.redhat.com/show_bug.cgi?id=2447262 https://www.cve.org/CVERecord?id=CVE-2026-4105 https://nvd.nist.gov/vuln/detail/CVE-2026-4105 https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4105.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1vG4ZYIu07BTj9XJ+a+P9Q==&#34;: {&#xA;      &#34;id&#34;: &#34;1vG4ZYIu07BTj9XJ+a+P9Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27171&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in zlib. An attacker providing specially crafted input to the `crc32_combine64` or `crc32_combine_gen64` functions could trigger an infinite loop within the `x2nmodp` function. This leads to excessive CPU consumption, which can result in a Denial of Service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-18T02:36:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27171 https://bugzilla.redhat.com/show_bug.cgi?id=2440530 https://www.cve.org/CVERecord?id=CVE-2026-27171 https://nvd.nist.gov/vuln/detail/CVE-2026-27171 https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/ https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf https://github.com/madler/zlib/issues/904 https://github.com/madler/zlib/releases/tag/v1.3.2 https://ostif.org/zlib-audit-complete/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27171.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;29qrZyz+fmdn9Nzjpl2/Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;29qrZyz+fmdn9Nzjpl2/Pg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22693&#34;,&#xA;      &#34;description&#34;: &#34;A null pointer dereference vector has been discovered in the harfbuzz package. A null pointer dereference vulnerability exists in the SubtableUnicodesCache::create function located in src/hb-ot-cmap-table.hh:1672-1673. The function fails to check if hb_malloc returns NULL before using placement new to construct an object at the returned pointer address. When hb_malloc fails to allocate memory (which can occur in low-memory conditions or when using custom allocators that simulate allocation failures), it returns NULL. The code then attempts to call the constructor on this null pointer using placement new syntax, resulting in undefined behavior and a Segmentation Fault.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-10T05:53:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22693 https://bugzilla.redhat.com/show_bug.cgi?id=2428439 https://www.cve.org/CVERecord?id=CVE-2026-22693 https://nvd.nist.gov/vuln/detail/CVE-2026-22693 https://github.com/harfbuzz/harfbuzz/commit/1265ff8d990284f04d8768f35b0e20ae5f60daae https://github.com/harfbuzz/harfbuzz/security/advisories/GHSA-xvjr-f2r9-c7ww https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22693.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2U8ppg+02PjFDuM5YqFstQ==&#34;: {&#xA;      &#34;id&#34;: &#34;2U8ppg+02PjFDuM5YqFstQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15282&#34;,&#xA;      &#34;description&#34;: &#34;Missing newline filtering has been discovered in Python. User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:35:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15282 https://bugzilla.redhat.com/show_bug.cgi?id=2431366 https://www.cve.org/CVERecord?id=CVE-2025-15282 https://nvd.nist.gov/vuln/detail/CVE-2025-15282 https://github.com/python/cpython/issues/143925 https://github.com/python/cpython/pull/143926 https://mail.python.org/archives/list/security-announce@python.org/thread/X66HL7SISGJT33J53OHXMZT4DFLMHVKF/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15282.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3IgZDz5UYkhu/U1/4kSWKg==&#34;: {&#xA;      &#34;id&#34;: &#34;3IgZDz5UYkhu/U1/4kSWKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-25317&#34;,&#xA;      &#34;description&#34;: &#34;It was found that some Linux vendors may assign the ownership of the /var/log/cups directory to the `lp` user. This could allow an attacker with such privileges to create empty files in arbitrary locations, or to force arbitrary files to be opened and closed, using a symlink attack. This has a low impact on the integrity of the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-25317 https://bugzilla.redhat.com/show_bug.cgi?id=1949119 https://www.cve.org/CVERecord?id=CVE-2021-25317 https://nvd.nist.gov/vuln/detail/CVE-2021-25317 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-25317.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3O4IzHXnRQMZXCe1gYATvw==&#34;: {&#xA;      &#34;id&#34;: &#34;3O4IzHXnRQMZXCe1gYATvw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22185&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenLDAP Lightning Memory-Mapped Database (LMDB) mdb_load. When processing malformed input, a local attacker can exploit a heap buffer underflow vulnerability in the readline() function. This can lead to an out-of-bounds read, potentially causing a denial of service (DoS) and limited disclosure of heap memory contents.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T20:26:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22185 https://bugzilla.redhat.com/show_bug.cgi?id=2427679 https://www.cve.org/CVERecord?id=CVE-2026-22185 https://nvd.nist.gov/vuln/detail/CVE-2026-22185 https://seclists.org/fulldisclosure/2026/Jan/5 https://seclists.org/fulldisclosure/2026/Jan/8 https://www.openldap.org/ https://www.vulncheck.com/advisories/openldap-lmdb-mdb-load-heap-buffer-underflow-in-readline https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22185.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openldap&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4/mftydHpy90Umw3G0mTuQ==&#34;: {&#xA;      &#34;id&#34;: &#34;4/mftydHpy90Umw3G0mTuQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-1000879&#34;,&#xA;      &#34;description&#34;: &#34;libarchive version commit 379867ecb330b3a952fb7bfa7bffb7bbd5547205 onwards (release v3.3.0 onwards) contains a CWE-476: NULL Pointer Dereference vulnerability in ACL parser - libarchive/archive_acl.c, archive_acl_from_text_l() that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted archive file.&#34;,&#xA;      &#34;issued&#34;: &#34;2018-11-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2018-1000879 https://bugzilla.redhat.com/show_bug.cgi?id=1663890 https://www.cve.org/CVERecord?id=CVE-2018-1000879 https://nvd.nist.gov/vuln/detail/CVE-2018-1000879 https://security.access.redhat.com/data/csaf/v2/vex/2018/cve-2018-1000879.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5B1tQ2BK8z/YjRkYcvwqag==&#34;: {&#xA;      &#34;id&#34;: &#34;5B1tQ2BK8z/YjRkYcvwqag==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-19244&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the way SQLite handled certain types of SQL queries using DISTINCT, OVER and ORDER BY clauses. A remote attacker could exploit this flaw by providing a malicious SQL query that, when processed by an application linked to SQLite, would crash the application causing a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-11-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-19244 https://bugzilla.redhat.com/show_bug.cgi?id=1777945 https://www.cve.org/CVERecord?id=CVE-2019-19244 https://nvd.nist.gov/vuln/detail/CVE-2019-19244 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-19244.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5ZHvcDYhgzWjwNpRgF2u1w==&#34;: {&#xA;      &#34;id&#34;: &#34;5ZHvcDYhgzWjwNpRgF2u1w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. When a separating comma ends up on a folded line during an address list folding of email headers, the comma is unintentionally unicode encoded. The expected behavior is that the separating comma remains unencoded. This can result in the address header being misinterpreted by some mail servers.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-28T18:59:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1795 https://bugzilla.redhat.com/show_bug.cgi?id=2349061 https://www.cve.org/CVERecord?id=CVE-2025-1795 https://nvd.nist.gov/vuln/detail/CVE-2025-1795 https://github.com/python/cpython/commit/09fab93c3d857496c0bd162797fab816c311ee48 https://github.com/python/cpython/commit/70754d21c288535e86070ca7a6e90dcb670b8593 https://github.com/python/cpython/commit/9148b77e0af91cdacaa7fe3dfac09635c3fe9a74 https://github.com/python/cpython/issues/100884 https://github.com/python/cpython/pull/100885 https://github.com/python/cpython/pull/119099 https://mail.python.org/archives/list/security-announce@python.org/thread/MB62IZMEC3UM6SGHP5LET5JX2Y7H4ZUR/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1795.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;673FKazcUiydbfN5c6amaw==&#34;: {&#xA;      &#34;id&#34;: &#34;673FKazcUiydbfN5c6amaw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-19190&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in the ncurses library. This issue occurs when processing a crafted terminfo database, causing a heap-based buffer overflow, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-05-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-19190 https://bugzilla.redhat.com/show_bug.cgi?id=2234923 https://www.cve.org/CVERecord?id=CVE-2020-19190 https://nvd.nist.gov/vuln/detail/CVE-2020-19190 https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-19190.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6Cqvzp5JbuVfHsuYnIJNFw==&#34;: {&#xA;      &#34;id&#34;: &#34;6Cqvzp5JbuVfHsuYnIJNFw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4438&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C library (glibc). When applications use the `gethostbyaddr` or `gethostbyaddr_r` functions with a `nsswitch.conf` configuration that specifies glibc&#39;s DNS backend, the library may return an invalid DNS hostname. This violates the DNS specification and could lead to applications receiving incorrect hostname information, potentially impacting network operations or security decisions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-20T19:59:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4438 https://bugzilla.redhat.com/show_bug.cgi?id=2449783 https://www.cve.org/CVERecord?id=CVE-2026-4438 https://nvd.nist.gov/vuln/detail/CVE-2026-4438 https://sourceware.org/bugzilla/show_bug.cgi?id=34015 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4438.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6FQUI3OxX4C5skWXKgq80Q==&#34;: {&#xA;      &#34;id&#34;: &#34;6FQUI3OxX4C5skWXKgq80Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0464&#34;,&#xA;      &#34;description&#34;: &#34;A security vulnerability has been identified in all supported OpenSSL versions related to verifying X.509 certificate chains that include policy constraints. This flaw allows attackers to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial of service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the -policy&#39; argument to the command line utilities or calling the X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0464 https://bugzilla.redhat.com/show_bug.cgi?id=2181082 https://www.cve.org/CVERecord?id=CVE-2023-0464 https://nvd.nist.gov/vuln/detail/CVE-2023-0464 https://www.openssl.org/news/secadv/20230322.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0464.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6Xr5PbPGSy+aHLDQ9q4L9w==&#34;: {&#xA;      &#34;id&#34;: &#34;6Xr5PbPGSy+aHLDQ9q4L9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1502&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. This vulnerability allows for the injection of extra information into HTTP communication. Specifically, the system does not properly prevent special characters (carriage return and line feed) from being included in HTTP client proxy tunnel headers or host fields.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-10T17:54:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1502 https://bugzilla.redhat.com/show_bug.cgi?id=2457409 https://www.cve.org/CVERecord?id=CVE-2026-1502 https://nvd.nist.gov/vuln/detail/CVE-2026-1502 https://github.com/python/cpython/commit/05ed7ce7ae9e17c23a04085b2539fe6d6d3cef69 https://github.com/python/cpython/issues/146211 https://github.com/python/cpython/pull/146212 https://mail.python.org/archives/list/security-announce@python.org/thread/2IVPAEQWUJBCTQZEJEVTYCIKSMQPGRZ3/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1502.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6p6EeZQEuYkK2CtO4ey3Ag==&#34;: {&#xA;      &#34;id&#34;: &#34;6p6EeZQEuYkK2CtO4ey3Ag==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66293&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read vulnerability has been discovered in libpng. This vulnerability is in libpng&#39;s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng&#39;s internal state management.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-03T20:33:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66293 https://bugzilla.redhat.com/show_bug.cgi?id=2418711 https://www.cve.org/CVERecord?id=CVE-2025-66293 https://nvd.nist.gov/vuln/detail/CVE-2025-66293 https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1 https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a https://github.com/pnggroup/libpng/issues/764 https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66293.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7Puka2o1jq4jSr2Hekrfhg==&#34;: {&#xA;      &#34;id&#34;: &#34;7Puka2o1jq4jSr2Hekrfhg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1757&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1757 https://bugzilla.redhat.com/show_bug.cgi?id=2435940 https://www.cve.org/CVERecord?id=CVE-2026-1757 https://nvd.nist.gov/vuln/detail/CVE-2026-1757 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1009 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1757.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7lnphmrb/VojuhlikpNO5w==&#34;: {&#xA;      &#34;id&#34;: &#34;7lnphmrb/VojuhlikpNO5w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-24401&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Avahi, a system that enables devices to discover services on a local network. A remote attacker can exploit this vulnerability by sending a specially crafted mDNS (multicast Domain Name System) response containing a recursive CNAME (Canonical Name) record. This triggers an uncontrolled recursion within the avahi-daemon process, leading to stack exhaustion and causing the service to crash. This results in a denial of service (DoS) for affected systems.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-24T01:25:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-24401 https://bugzilla.redhat.com/show_bug.cgi?id=2432534 https://www.cve.org/CVERecord?id=CVE-2026-24401 https://nvd.nist.gov/vuln/detail/CVE-2026-24401 https://github.com/avahi/avahi/commit/78eab31128479f06e30beb8c1cbf99dd921e2524 https://github.com/avahi/avahi/issues/501 https://github.com/avahi/avahi/security/advisories/GHSA-h4vp-5m8j-f6w3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-24401.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;86unVXyTxdffdcXWZTYw5g==&#34;: {&#xA;      &#34;id&#34;: &#34;86unVXyTxdffdcXWZTYw5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0465&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. OpenSSL and other certificate policy checks silently ignore invalid certificate policies in leaf certificates that are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy&#39; argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0465 https://bugzilla.redhat.com/show_bug.cgi?id=2182561 https://www.cve.org/CVERecord?id=CVE-2023-0465 https://nvd.nist.gov/vuln/detail/CVE-2023-0465 https://www.openssl.org/news/secadv/20230328.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0465.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8D3i4K1ylUr5dGk9imV9zA==&#34;: {&#xA;      &#34;id&#34;: &#34;8D3i4K1ylUr5dGk9imV9zA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8I2jFG8JRR+6+eqqYlXhAg==&#34;: {&#xA;      &#34;id&#34;: &#34;8I2jFG8JRR+6+eqqYlXhAg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-20225&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in python-pip due to a flaw in the --extra-index-url option, where it installs the version with the highest version number, even if the user intended to obtain a private package from a private index. Exploitation requires that the package does not already exist in the public index, allowing an attacker to place the package there with an arbitrary version number.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2018-20225 https://bugzilla.redhat.com/show_bug.cgi?id=1835736 https://www.cve.org/CVERecord?id=CVE-2018-20225 https://nvd.nist.gov/vuln/detail/CVE-2018-20225 https://cowlicks.website/posts/arbitrary-code-execution-from-pips-extra-index-url.html https://security.access.redhat.com/data/csaf/v2/vex/2018/cve-2018-20225.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8KJb4x3mXgChaQULEsid2A==&#34;: {&#xA;      &#34;id&#34;: &#34;8KJb4x3mXgChaQULEsid2A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15224&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcurl. When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15224 https://bugzilla.redhat.com/show_bug.cgi?id=2426410 https://www.cve.org/CVERecord?id=CVE-2025-15224 https://nvd.nist.gov/vuln/detail/CVE-2025-15224 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15224.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8Sec+JvKiQWGqYCOBdZhjg==&#34;: {&#xA;      &#34;id&#34;: &#34;8Sec+JvKiQWGqYCOBdZhjg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5918&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5918 https://bugzilla.redhat.com/show_bug.cgi?id=2370877 https://www.cve.org/CVERecord?id=CVE-2025-5918 https://nvd.nist.gov/vuln/detail/CVE-2025-5918 https://github.com/libarchive/libarchive/pull/2584 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5918.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8TgjbHNGzIFm7/fF9DBU7Q==&#34;: {&#xA;      &#34;id&#34;: &#34;8TgjbHNGzIFm7/fF9DBU7Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34757&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a library used for handling PNG (Portable Network Graphics) image files. This vulnerability arises when an application reuses a pointer, previously obtained from functions like png_get_PLTE, by passing it back to a corresponding setter function within the same image structure. This action causes the setter to access memory that has already been deallocated, leading to a use-after-free condition. A local attacker could potentially exploit this flaw to corrupt image metadata or disclose sensitive information from the application&#39;s memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-09T14:41:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34757 https://bugzilla.redhat.com/show_bug.cgi?id=2456918 https://www.cve.org/CVERecord?id=CVE-2026-34757 https://nvd.nist.gov/vuln/detail/CVE-2026-34757 https://github.com/pnggroup/libpng/commit/398cbe3df03f4e11bb031e07f416dfdde3684e8a https://github.com/pnggroup/libpng/commit/55d20aaa322c9274491cda82c5cd4f99b48c6bcc https://github.com/pnggroup/libpng/issues/836 https://github.com/pnggroup/libpng/issues/837 https://github.com/pnggroup/libpng/security/advisories/GHSA-6fr7-g8h7-v645 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34757.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8ZxbhBIT+9Mj99/XbMpLSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8ZxbhBIT+9Mj99/XbMpLSQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0232&#34;,&#xA;      &#34;description&#34;: &#34;A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0232 https://bugzilla.redhat.com/show_bug.cgi?id=2243754 https://www.cve.org/CVERecord?id=CVE-2024-0232 https://nvd.nist.gov/vuln/detail/CVE-2024-0232 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0232.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8qOJVWAut1+UqTXPOWH12g==&#34;: {&#xA;      &#34;id&#34;: &#34;8qOJVWAut1+UqTXPOWH12g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8291&#34;,&#xA;      &#34;description&#34;: &#34;A zip file handling flaw has been discovered in the python standard library `zipfile` module. The &#39;zipfile&#39; module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the &#39;zipfile&#39; module compared to other ZIP implementations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-07T18:10:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8291 https://bugzilla.redhat.com/show_bug.cgi?id=2402342 https://www.cve.org/CVERecord?id=CVE-2025-8291 https://nvd.nist.gov/vuln/detail/CVE-2025-8291 https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267 https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6 https://github.com/python/cpython/issues/139700 https://github.com/python/cpython/pull/139702 https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8291.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8rvqTFlh9aOz4UvxQN0SBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8rvqTFlh9aOz4UvxQN0SBQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3479&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s `pkgutil.get_data()` function, which is used to retrieve data from packages. This function did not properly validate the `resource` argument, allowing a local attacker to perform path traversal attacks. Path traversal enables an attacker to access files and directories stored outside the intended root directory, potentially leading to information disclosure or unintended file access.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T18:13:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3479 https://bugzilla.redhat.com/show_bug.cgi?id=2448746 https://www.cve.org/CVERecord?id=CVE-2026-3479 https://nvd.nist.gov/vuln/detail/CVE-2026-3479 https://github.com/python/cpython/issues/146121 https://github.com/python/cpython/pull/146122 https://mail.python.org/archives/list/security-announce@python.org/thread/WYLLVQOOCKGK73JM7Z7ZSNOJC4N7BAWY/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3479.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8rxYDEPu2XxazQ3cBUhX0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;8rxYDEPu2XxazQ3cBUhX0Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-9923&#34;,&#xA;      &#34;description&#34;: &#34;pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-01-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-9923 https://bugzilla.redhat.com/show_bug.cgi?id=1691764 https://www.cve.org/CVERecord?id=CVE-2019-9923 https://nvd.nist.gov/vuln/detail/CVE-2019-9923 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-9923.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;92KuvWwbPhsQNPu0knrHAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;92KuvWwbPhsQNPu0knrHAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6170&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6170 https://bugzilla.redhat.com/show_bug.cgi?id=2372952 https://www.cve.org/CVERecord?id=CVE-2025-6170 https://nvd.nist.gov/vuln/detail/CVE-2025-6170 https://gitlab.gnome.org/GNOME/libxml2/-/issues/941 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6170.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;97PwDrD8knMveLXwKCvQjA==&#34;: {&#xA;      &#34;id&#34;: &#34;97PwDrD8knMveLXwKCvQjA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9jHXNtwzqlOir/Op7pd9+w==&#34;: {&#xA;      &#34;id&#34;: &#34;9jHXNtwzqlOir/Op7pd9+w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68276&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Avahi, a system that facilitates service discovery on a local network. An unprivileged local user can exploit this vulnerability by creating record browsers with the AVAHI_LOOKUP_USE_WIDE_AREA flag set via D-Bus. This can lead to a Denial of Service (DoS) by crashing the avahi-daemon, making the service unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T17:31:49Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68276 https://bugzilla.redhat.com/show_bug.cgi?id=2428713 https://www.cve.org/CVERecord?id=CVE-2025-68276 https://nvd.nist.gov/vuln/detail/CVE-2025-68276 https://github.com/avahi/avahi/commit/ede7048475c5d47d53890e3bc1350dda8e0b3688 https://github.com/avahi/avahi/pull/806 https://github.com/avahi/avahi/security/advisories/GHSA-mhf3-865v-g5rc https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68276.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9oBjtBiHtz7+Hwc4swPaAw==&#34;: {&#xA;      &#34;id&#34;: &#34;9oBjtBiHtz7+Hwc4swPaAw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34979&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenPrinting CUPS. A remote attacker could exploit a heap-based buffer overflow by sending specially crafted job attributes when building filter option strings. This could lead to a denial of service, making the printing system unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-03T21:16:38Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34979 https://bugzilla.redhat.com/show_bug.cgi?id=2454946 https://www.cve.org/CVERecord?id=CVE-2026-34979 https://nvd.nist.gov/vuln/detail/CVE-2026-34979 https://github.com/OpenPrinting/cups/security/advisories/GHSA-6qxf-7jx6-86fh https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34979.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9uK7ZDYgFtqP786n0QunAg==&#34;: {&#xA;      &#34;id&#34;: &#34;9uK7ZDYgFtqP786n0QunAg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39804&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tar. This issue occurs when extended attributes are processed in PAX archives, and could allow an attacker to cause an application crash, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39804 https://bugzilla.redhat.com/show_bug.cgi?id=2254067 https://www.cve.org/CVERecord?id=CVE-2023-39804 https://nvd.nist.gov/vuln/detail/CVE-2023-39804 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39804.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9zRC9UwUH2bQs1UcHQ5UTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9zRC9UwUH2bQs1UcHQ5UTQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-9937&#34;,&#xA;      &#34;description&#34;: &#34;In SQLite 3.27.2, interleaving reads and writes in a single transaction with an fts5 virtual table will lead to a NULL Pointer Dereference in fts5ChunkIterate in sqlite3.c. This is related to ext/fts5/fts5_hash.c and ext/fts5/fts5_index.c.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-03-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-9937 https://bugzilla.redhat.com/show_bug.cgi?id=1692357 https://www.cve.org/CVERecord?id=CVE-2019-9937 https://nvd.nist.gov/vuln/detail/CVE-2019-9937 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-9937.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;A1UDSDMkPKOSx7ma/geQyg==&#34;: {&#xA;      &#34;id&#34;: &#34;A1UDSDMkPKOSx7ma/geQyg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68468&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Avahi. A remote attacker can cause a Denial of Service (DoS) by sending specially crafted unsolicited announcements containing CNAME resource records. These records, when pointing to other resource records with short Time-To-Live (TTL) values, can lead to the `avahi-daemon` crashing once they expire. This vulnerability impacts the availability of services relying on Avahi&#39;s service discovery.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T17:38:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68468 https://bugzilla.redhat.com/show_bug.cgi?id=2428714 https://www.cve.org/CVERecord?id=CVE-2025-68468 https://nvd.nist.gov/vuln/detail/CVE-2025-68468 https://github.com/avahi/avahi/commit/f66be13d7f31a3ef806d226bf8b67240179d309a https://github.com/avahi/avahi/issues/683 https://github.com/avahi/avahi/security/advisories/GHSA-cp79-r4x9-vf52 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68468.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AE8Cp1u8I9t52OYW7oGU4w==&#34;: {&#xA;      &#34;id&#34;: &#34;AE8Cp1u8I9t52OYW7oGU4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-57970&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libarchive library. A specially-crafted tar file may trigger a head-based buffer over-read condition due to incorrect handling of truncation in the middle of a long GNU linkname. This issue can cause an application crash leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-57970 https://bugzilla.redhat.com/show_bug.cgi?id=2345954 https://www.cve.org/CVERecord?id=CVE-2024-57970 https://nvd.nist.gov/vuln/detail/CVE-2024-57970 https://github.com/libarchive/libarchive/issues/2415 https://github.com/libarchive/libarchive/pull/2422 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-57970.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AZQ9MHTiNLYiRU7sYZlVGw==&#34;: {&#xA;      &#34;id&#34;: &#34;AZQ9MHTiNLYiRU7sYZlVGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4899&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in zstd. This flaw allows an attacker to supply an empty string as an argument to the command line tool to cause a buffer overrun.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4899 https://bugzilla.redhat.com/show_bug.cgi?id=2179864 https://www.cve.org/CVERecord?id=CVE-2022-4899 https://nvd.nist.gov/vuln/detail/CVE-2022-4899 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4899.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zstd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;B5eXEM8SeidgdpzXoFJFGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;B5eXEM8SeidgdpzXoFJFGQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33636&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng. A remote attacker could exploit an out-of-bounds read and write vulnerability in the ARM/AArch64 Neon-optimized palette expansion path. This occurs when processing a final partial chunk of 8-bit paletted rows without verifying sufficient input pixels, leading to dereferencing pointers before the start of the row buffer and writing expanded pixel data to underflowed positions. This flaw can result in information disclosure and denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-26T16:51:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33636 https://bugzilla.redhat.com/show_bug.cgi?id=2451819 https://www.cve.org/CVERecord?id=CVE-2026-33636 https://nvd.nist.gov/vuln/detail/CVE-2026-33636 https://github.com/pnggroup/libpng/commit/7734cda20cf1236aef60f3bbd2267c97bbb40869 https://github.com/pnggroup/libpng/commit/aba9f18eba870d14fb52c5ba5d73451349e339c3 https://github.com/pnggroup/libpng/security/advisories/GHSA-wjr5-c57x-95m2 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33636.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BV++s35Ur4bQRS6HK0QCIA==&#34;: {&#xA;      &#34;id&#34;: &#34;BV++s35Ur4bQRS6HK0QCIA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-31789&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability, a heap buffer overflow, affects 32-bit systems when processing an unusually large X.509 certificate. If an application or service attempts to print or log such a specially crafted certificate, it could lead to a system crash or potentially allow an attacker to execute arbitrary code. This issue is considered low severity due to the specific conditions required for exploitation, including the need for an extremely large certificate and a 32-bit operating environment.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-31789 https://bugzilla.redhat.com/show_bug.cgi?id=2451095 https://www.cve.org/CVERecord?id=CVE-2026-31789 https://nvd.nist.gov/vuln/detail/CVE-2026-31789 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-31789.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Bgew407C4GMDdNe8dNeN7w==&#34;: {&#xA;      &#34;id&#34;: &#34;Bgew407C4GMDdNe8dNeN7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-52615&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-52615 https://bugzilla.redhat.com/show_bug.cgi?id=2326418 https://www.cve.org/CVERecord?id=CVE-2024-52615 https://nvd.nist.gov/vuln/detail/CVE-2024-52615 https://github.com/avahi/avahi/pull/577 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-52615.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BooDzA4nzaDI1l3E5zAHgg==&#34;: {&#xA;      &#34;id&#34;: &#34;BooDzA4nzaDI1l3E5zAHgg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3997&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may lead to a denial of service at boot time when too many nested directories are created in /tmp.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-01-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3997 https://bugzilla.redhat.com/show_bug.cgi?id=2024639 https://www.cve.org/CVERecord?id=CVE-2021-3997 https://nvd.nist.gov/vuln/detail/CVE-2021-3997 https://www.openwall.com/lists/oss-security/2022/01/10/2 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3997.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DDWmqlxBSfXi2KJJ5mwTNg==&#34;: {&#xA;      &#34;id&#34;: &#34;DDWmqlxBSfXi2KJJ5mwTNg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-60753&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in apply_substitution() function in libarchive&#39;s bsdtar allows crafted -s substitution rules to repeatedly match a zero-length substring and append replacements without advancing the input pointer. When the rule uses the global /g flag (or an explicitly empty pattern), this leads to unbounded output allocation and eventual process OOM (Denial of Service). Upgrade to libarchive 3.8.1 or apply a patch that prevents zero-length match loops or rejects empty patterns.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-60753 https://bugzilla.redhat.com/show_bug.cgi?id=2412648 https://www.cve.org/CVERecord?id=CVE-2025-60753 https://nvd.nist.gov/vuln/detail/CVE-2025-60753 https://github.com/Papya-j/CVE/tree/main/CVE-2025-60753 https://github.com/libarchive/libarchive/issues/2725 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-60753.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EKs36DFwHVCzU/cF0Be9pQ==&#34;: {&#xA;      &#34;id&#34;: &#34;EKs36DFwHVCzU/cF0Be9pQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29499&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29499 https://bugzilla.redhat.com/show_bug.cgi?id=2211828 https://www.cve.org/CVERecord?id=CVE-2023-29499 https://nvd.nist.gov/vuln/detail/CVE-2023-29499 https://gitlab.gnome.org/GNOME/glib/-/issues/2794 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29499.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EQ4eP3gKo3y8JsWUiWr6+g==&#34;: {&#xA;      &#34;id&#34;: &#34;EQ4eP3gKo3y8JsWUiWr6+g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-1000880&#34;,&#xA;      &#34;description&#34;: &#34;libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation vulnerability in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. This attack appear to be exploitable via the victim must open a specially crafted WARC file.&#34;,&#xA;      &#34;issued&#34;: &#34;2018-11-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2018-1000880 https://bugzilla.redhat.com/show_bug.cgi?id=1663892 https://www.cve.org/CVERecord?id=CVE-2018-1000880 https://nvd.nist.gov/vuln/detail/CVE-2018-1000880 https://security.access.redhat.com/data/csaf/v2/vex/2018/cve-2018-1000880.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EiJx6rOT8KoLX+Wu7/N6HQ==&#34;: {&#xA;      &#34;id&#34;: &#34;EiJx6rOT8KoLX+Wu7/N6HQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27113&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows a NULL pointer dereference, leading to a potential crash or denial of service via a crafted XML pattern.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27113 https://bugzilla.redhat.com/show_bug.cgi?id=2346410 https://www.cve.org/CVERecord?id=CVE-2025-27113 https://nvd.nist.gov/vuln/detail/CVE-2025-27113 https://gitlab.gnome.org/GNOME/libxml2/-/issues/861 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27113.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EiL50P2QSOoRA18XAAH6Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;EiL50P2QSOoRA18XAAH6Pg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32665&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32665 https://bugzilla.redhat.com/show_bug.cgi?id=2211827 https://www.cve.org/CVERecord?id=CVE-2023-32665 https://nvd.nist.gov/vuln/detail/CVE-2023-32665 https://gitlab.gnome.org/GNOME/glib/-/issues/2121 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32665.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ElIjMFAz33tt/XVMysRkdA==&#34;: {&#xA;      &#34;id&#34;: &#34;ElIjMFAz33tt/XVMysRkdA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0988&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0988 https://bugzilla.redhat.com/show_bug.cgi?id=2429886 https://www.cve.org/CVERecord?id=CVE-2026-0988 https://nvd.nist.gov/vuln/detail/CVE-2026-0988 https://gitlab.gnome.org/GNOME/glib/-/issues/3851 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0988.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FkRDB0vpJYeh2ipqLS0/Iw==&#34;: {&#xA;      &#34;id&#34;: &#34;FkRDB0vpJYeh2ipqLS0/Iw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-28164&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng. This buffer overflow vulnerability allows a local attacker to cause a denial of service (DoS) by exploiting the `png_create_read_struct()` function. This can lead to the affected system becoming unresponsive or crashing.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-28164 https://bugzilla.redhat.com/show_bug.cgi?id=2433398 https://www.cve.org/CVERecord?id=CVE-2025-28164 https://nvd.nist.gov/vuln/detail/CVE-2025-28164 https://gist.github.com/kittener/506516f8c22178005b4379c8b2a7de20 https://github.com/pnggroup/libpng/issues/655 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-28164.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Fp999hDC/lucBsNHwOlp/A==&#34;: {&#xA;      &#34;id&#34;: &#34;Fp999hDC/lucBsNHwOlp/A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-13176&#34;,&#xA;      &#34;description&#34;: &#34;A timing side-channel vulnerability was found in OpenSSL. This vulnerability allows an attacker to recover the private key. However, measuring the timing would require local access to the signing application or a fast network connection with low latency. There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This issue can happen with significant probability only for some of the supported elliptic curves. In particular, the NIST P-521 curve is affected.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-20T13:29:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-13176 https://bugzilla.redhat.com/show_bug.cgi?id=2338999 https://www.cve.org/CVERecord?id=CVE-2024-13176 https://nvd.nist.gov/vuln/detail/CVE-2024-13176 https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-13176.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;G7IyfoPhe9f8QzIGbOfn7Q==&#34;: {&#xA;      &#34;id&#34;: &#34;G7IyfoPhe9f8QzIGbOfn7Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45322&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. In an out-of-memory condition or when limiting the memory allocation, processing a XML document using the HTML parser may result in a use-after-free vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45322 https://bugzilla.redhat.com/show_bug.cgi?id=2242945 https://www.cve.org/CVERecord?id=CVE-2023-45322 https://nvd.nist.gov/vuln/detail/CVE-2023-45322 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45322.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;H2CablNBrQ/I5AsUjk5xyw==&#34;: {&#xA;      &#34;id&#34;: &#34;H2CablNBrQ/I5AsUjk5xyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-20839&#34;,&#xA;      &#34;description&#34;: &#34;systemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdown, or using Ctrl-Alt-F1 and Ctrl-Alt-F2. This occurs because the KDGKBMODE (aka current keyboard mode) check is mishandled.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-05-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2018-20839 https://bugzilla.redhat.com/show_bug.cgi?id=1716955 https://www.cve.org/CVERecord?id=CVE-2018-20839 https://nvd.nist.gov/vuln/detail/CVE-2018-20839 https://security.access.redhat.com/data/csaf/v2/vex/2018/cve-2018-20839.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;H9Ud41wofJc/QlL6Rm7WkA==&#34;: {&#xA;      &#34;id&#34;: &#34;H9Ud41wofJc/QlL6Rm7WkA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0968&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libssh in which a malicious SFTP (SSH File Transfer Protocol) server can exploit this by sending a malformed &#39;longname&#39; field within an `SSH_FXP_NAME` message during a file listing operation. This missing null check can lead to reading beyond allocated memory on the heap. This can cause unexpected behavior or lead to a denial of service (DoS) due to application crashes.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-10T18:46:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0968 https://bugzilla.redhat.com/show_bug.cgi?id=2436982 https://www.cve.org/CVERecord?id=CVE-2026-0968 https://nvd.nist.gov/vuln/detail/CVE-2026-0968 https://www.libssh.org/2026/02/10/libssh-0-12-0-and-0-11-4-security-releases/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0968.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HB9r/GLycEmk6aXttwtBlw==&#34;: {&#xA;      &#34;id&#34;: &#34;HB9r/GLycEmk6aXttwtBlw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11468&#34;,&#xA;      &#34;description&#34;: &#34;Missing character filtering has been discovered in Python. When folding a long comment in an email header containing exclusively unfoldable characters, the parenthesis would not be preserved. This could be used for injecting headers into email messages where addresses are user-controlled and not sanitized.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:09:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11468 https://bugzilla.redhat.com/show_bug.cgi?id=2431375 https://www.cve.org/CVERecord?id=CVE-2025-11468 https://nvd.nist.gov/vuln/detail/CVE-2025-11468 https://github.com/python/cpython/issues/143935 https://github.com/python/cpython/pull/143936 https://mail.python.org/archives/list/security-announce@python.org/thread/FELSEOLBI2QR6YLG6Q7VYF7FWSGQTKLI/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11468.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HKrLnQyTw1292mNt3MQ0aQ==&#34;: {&#xA;      &#34;id&#34;: &#34;HKrLnQyTw1292mNt3MQ0aQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-7592&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the `http.cookies` module in the Python package. When parsing cookies that contain backslashes, under certain circumstances, the module uses an algorithm with quadratic complexity, leading to excessive CPU consumption.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7592 https://bugzilla.redhat.com/show_bug.cgi?id=2305879 https://www.cve.org/CVERecord?id=CVE-2024-7592 https://nvd.nist.gov/vuln/detail/CVE-2024-7592 https://github.com/python/cpython/issues/123067 https://github.com/python/cpython/pull/123075 https://mail.python.org/archives/list/security-announce@python.org/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7592.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HNpGGr9eP5twQKC3yCh1mA==&#34;: {&#xA;      &#34;id&#34;: &#34;HNpGGr9eP5twQKC3yCh1mA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5915&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5915 https://bugzilla.redhat.com/show_bug.cgi?id=2370865 https://www.cve.org/CVERecord?id=CVE-2025-5915 https://nvd.nist.gov/vuln/detail/CVE-2025-5915 https://github.com/libarchive/libarchive/pull/2599 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5915.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HTk+AAyRWNCrZTtBLx34Aw==&#34;: {&#xA;      &#34;id&#34;: &#34;HTk+AAyRWNCrZTtBLx34Aw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25260&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference vulnerability in the elfutils library has been discovered. This vulnerability occurs within the handle_verdef() function in the readelf.c source file. A NULL pointer dereference typically happens when a program attempts to access memory using a pointer that is not pointing anywhere (i.e., it&#39;s NULL), leading to a crash or potentially exploitable behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25260 https://bugzilla.redhat.com/show_bug.cgi?id=2265194 https://www.cve.org/CVERecord?id=CVE-2024-25260 https://nvd.nist.gov/vuln/detail/CVE-2024-25260 https://github.com/schsiung/fuzzer_issues/issues/1 https://sourceware.org/bugzilla/show_bug.cgi?id=31058 https://sourceware.org/elfutils/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25260.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;elfutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HdAyLUATPStr/HXiy9fgQw==&#34;: {&#xA;      &#34;id&#34;: &#34;HdAyLUATPStr/HXiy9fgQw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0990&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0990 https://bugzilla.redhat.com/show_bug.cgi?id=2429959 https://www.cve.org/CVERecord?id=CVE-2026-0990 https://nvd.nist.gov/vuln/detail/CVE-2026-0990 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0990.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HuLJLN6ajygY/CpLyzV5lw==&#34;: {&#xA;      &#34;id&#34;: &#34;HuLJLN6ajygY/CpLyzV5lw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45803&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn&#39;t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren&#39;t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn&#39;t exploitable.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45803 https://bugzilla.redhat.com/show_bug.cgi?id=2246840 https://www.cve.org/CVERecord?id=CVE-2023-45803 https://nvd.nist.gov/vuln/detail/CVE-2023-45803 https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9 https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4 https://www.rfc-editor.org/rfc/rfc9110.html#name-get https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45803.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HuOxI+pWjgGV0XsBvltzlg==&#34;: {&#xA;      &#34;id&#34;: &#34;HuOxI+pWjgGV0XsBvltzlg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-19187&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ncurses library. This issue occurs when processing a crafted terminfo database, causing a heap-based buffer overflow, resulting in an application crash, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-05-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-19187 https://bugzilla.redhat.com/show_bug.cgi?id=2234911 https://www.cve.org/CVERecord?id=CVE-2020-19187 https://nvd.nist.gov/vuln/detail/CVE-2020-19187 https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-19187.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;I31WPu2ZGWOsqloSJfE2Fg==&#34;: {&#xA;      &#34;id&#34;: &#34;I31WPu2ZGWOsqloSJfE2Fg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25646&#34;,&#xA;      &#34;description&#34;: &#34;A heap based buffer overflow flaw has been discovered in LibPNG. Prior to version 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user&#39;s display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-10T17:04:38Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25646 https://bugzilla.redhat.com/show_bug.cgi?id=2438542 https://www.cve.org/CVERecord?id=CVE-2026-25646 https://nvd.nist.gov/vuln/detail/CVE-2026-25646 http://www.openwall.com/lists/oss-security/2026/02/09/7 https://github.com/pnggroup/libpng/commit/01d03b8453eb30ade759cd45c707e5a1c7277d88 https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25646.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IItHEdPWz5fl9O7ZhzjDAA==&#34;: {&#xA;      &#34;id&#34;: &#34;IItHEdPWz5fl9O7ZhzjDAA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0672&#34;,&#xA;      &#34;description&#34;: &#34;An injection flaw has been discovered in Python. When using http.cookies.Morsel, user-controlled cookie values and parameters can allow injecting HTTP headers into messages. Patch rejects all control characters within cookie names, values, and parameters.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:52:33Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0672 https://bugzilla.redhat.com/show_bug.cgi?id=2431374 https://www.cve.org/CVERecord?id=CVE-2026-0672 https://nvd.nist.gov/vuln/detail/CVE-2026-0672 https://github.com/python/cpython/issues/143919 https://github.com/python/cpython/pull/143920 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0672.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;K3eafQ/8P8PEZ3BPWZfCgg==&#34;: {&#xA;      &#34;id&#34;: &#34;K3eafQ/8P8PEZ3BPWZfCgg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27447&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenPrinting CUPS. This authorization bypass vulnerability allows an unprivileged user to gain unauthorized access to restricted operations. This can be exploited by using a username that differs only in case from an authorized user during authorization checks.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-03T21:11:59Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27447 https://bugzilla.redhat.com/show_bug.cgi?id=2454949 https://www.cve.org/CVERecord?id=CVE-2026-27447 https://nvd.nist.gov/vuln/detail/CVE-2026-27447 https://github.com/OpenPrinting/cups/commit/88516bf6d9e34cef7a64a704b856b837f70cd220 https://github.com/OpenPrinting/cups/security/advisories/GHSA-v987-m8hp-phj9 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27447.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KCgCqCavM9U0xL+GHJqzSg==&#34;: {&#xA;      &#34;id&#34;: &#34;KCgCqCavM9U0xL+GHJqzSg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0964&#34;,&#xA;      &#34;description&#34;: &#34;A malicious SCP server can send unexpected paths that could make the\nclient application override local files outside of working directory.\nThis could be misused to create malicious executable or configuration\nfiles and make the user execute them under specific consequences.\n\nThis is the same issue as in OpenSSH, tracked as CVE-2019-6111.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-10T18:44:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0964 https://bugzilla.redhat.com/show_bug.cgi?id=2436979 https://www.cve.org/CVERecord?id=CVE-2026-0964 https://nvd.nist.gov/vuln/detail/CVE-2026-0964 https://www.libssh.org/2026/02/10/libssh-0-12-0-and-0-11-4-security-releases/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0964.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KExChYIaW0MvXNLWbjS/Hw==&#34;: {&#xA;      &#34;id&#34;: &#34;KExChYIaW0MvXNLWbjS/Hw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-41080&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat. A remote attacker could exploit this vulnerability by providing a specially crafted XML document that leverages insufficient entropy in the hash function. This can lead to hash flooding, a type of Denial of Service (DoS) attack, where the system becomes unresponsive or crashes due to excessive resource consumption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-16T16:52:01Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-41080 https://bugzilla.redhat.com/show_bug.cgi?id=2458967 https://www.cve.org/CVERecord?id=CVE-2026-41080 https://nvd.nist.gov/vuln/detail/CVE-2026-41080 https://github.com/libexpat/libexpat/issues/47 https://github.com/libexpat/libexpat/pull/1183 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-41080.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KaROgE0QmtiOixMG9Wi1RA==&#34;: {&#xA;      &#34;id&#34;: &#34;KaROgE0QmtiOixMG9Wi1RA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32636&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32636 https://bugzilla.redhat.com/show_bug.cgi?id=2211833 https://www.cve.org/CVERecord?id=CVE-2023-32636 https://nvd.nist.gov/vuln/detail/CVE-2023-32636 https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835 https://gitlab.gnome.org/GNOME/glib/-/issues/2841 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32636.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;L3k0cIIlkMGQFiWnZm8Mlg==&#34;: {&#xA;      &#34;id&#34;: &#34;L3k0cIIlkMGQFiWnZm8Mlg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-12781&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the base64 module in the Python standard library. The b64decode, standard_b64decode and urlsafe_b64decode functions will always accept the &#39;+&#39; and &#39;/&#39; characters even when an alternative base64 alphabet is specified via the altchars parameter that excludes them. This input validation bypass allows malformed or unexpected data to pass through decoding filters, potentially causing logical errors or data integrity issues in applications relying on strict character sets.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-21T19:34:47Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-12781 https://bugzilla.redhat.com/show_bug.cgi?id=2431736 https://www.cve.org/CVERecord?id=CVE-2025-12781 https://nvd.nist.gov/vuln/detail/CVE-2025-12781 https://github.com/python/cpython/issues/125346 https://github.com/python/cpython/pull/141128 https://mail.python.org/archives/list/security-announce@python.org/thread/KRI7GC6S27YV5NJ4FPDALS2WI5ENAFJ6/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-12781.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;L7QbkTbsy8v3tMfOqNsVKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;L7QbkTbsy8v3tMfOqNsVKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-7531&#34;,&#xA;      &#34;description&#34;: &#34;The Mozilla Foundation Security Advisory describes this flaw as:\n\nCalling PK11_Encrypt() in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on Intel Sandy Bridge and later processors. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7531 https://bugzilla.redhat.com/show_bug.cgi?id=2303148 https://www.cve.org/CVERecord?id=CVE-2024-7531 https://nvd.nist.gov/vuln/detail/CVE-2024-7531 https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7531 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7531.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nss&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LWLSX4FCLbzYWK97i5Or+A==&#34;: {&#xA;      &#34;id&#34;: &#34;LWLSX4FCLbzYWK97i5Or+A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28389&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker could exploit this by sending a specially crafted Cryptographic Message Syntax (CMS) EnvelopedData message with KeyAgreeRecipientInfo. This vulnerability arises because the software attempts to process an optional field without verifying its existence, leading to a NULL pointer dereference. This can result in a Denial of Service (DoS) for applications that handle untrusted CMS data.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28389 https://bugzilla.redhat.com/show_bug.cgi?id=2451096 https://www.cve.org/CVERecord?id=CVE-2026-28389 https://nvd.nist.gov/vuln/detail/CVE-2026-28389 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28389.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Lt2Hg7sVYgz0GD7ldFmjjA==&#34;: {&#xA;      &#34;id&#34;: &#34;Lt2Hg7sVYgz0GD7ldFmjjA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32777&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat. A remote attacker could exploit this vulnerability by providing specially crafted Document Type Definition (DTD) content. This could lead to an infinite loop during parsing, resulting in a Denial of Service (DoS) for the application using libexpat.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-16T06:58:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32777 https://bugzilla.redhat.com/show_bug.cgi?id=2447890 https://www.cve.org/CVERecord?id=CVE-2026-32777 https://nvd.nist.gov/vuln/detail/CVE-2026-32777 https://github.com/libexpat/libexpat/issues/1161 https://github.com/libexpat/libexpat/pull/1159 https://github.com/libexpat/libexpat/pull/1162 https://issues.oss-fuzz.com/issues/486993411 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32777.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MRnBR1NwPejsF0F/Po53Ew==&#34;: {&#xA;      &#34;id&#34;: &#34;MRnBR1NwPejsF0F/Po53Ew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-8905&#34;,&#xA;      &#34;description&#34;: &#34;do_core_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printable, a different vulnerability than CVE-2018-10360.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-02-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-8905 https://bugzilla.redhat.com/show_bug.cgi?id=1679181 https://www.cve.org/CVERecord?id=CVE-2019-8905 https://nvd.nist.gov/vuln/detail/CVE-2019-8905 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-8905.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;file&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MW3KGjkk7BWuR5JCc6cywg==&#34;: {&#xA;      &#34;id&#34;: &#34;MW3KGjkk7BWuR5JCc6cywg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-52616&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-52616 https://bugzilla.redhat.com/show_bug.cgi?id=2326429 https://www.cve.org/CVERecord?id=CVE-2024-52616 https://nvd.nist.gov/vuln/detail/CVE-2024-52616 https://github.com/avahi/avahi/pull/577 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-52616.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;O6eQrDqYe8zCvECWFMIzFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;O6eQrDqYe8zCvECWFMIzFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-8906&#34;,&#xA;      &#34;description&#34;: &#34;do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-01-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-8906 https://bugzilla.redhat.com/show_bug.cgi?id=1679175 https://www.cve.org/CVERecord?id=CVE-2019-8906 https://nvd.nist.gov/vuln/detail/CVE-2019-8906 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-8906.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;file&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;O8fIVXqcGshIonMWsEH9gA==&#34;: {&#xA;      &#34;id&#34;: &#34;O8fIVXqcGshIonMWsEH9gA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5916&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive. This bug affects libarchive versions prior to 3.8.0.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5916 https://bugzilla.redhat.com/show_bug.cgi?id=2370872 https://www.cve.org/CVERecord?id=CVE-2025-5916 https://nvd.nist.gov/vuln/detail/CVE-2025-5916 https://github.com/libarchive/libarchive/pull/2568 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5916.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OFdQC3/0S5rItoyqpACTFw==&#34;: {&#xA;      &#34;id&#34;: &#34;OFdQC3/0S5rItoyqpACTFw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4224&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow flaw has been discovered in the python pyexpat module. When an Expat parser with a registered ElementDeclHandler parses an inline document type definition containing a deeply nested content model a C stack overflow occurs. This will result in a program crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-16T17:52:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4224 https://bugzilla.redhat.com/show_bug.cgi?id=2448181 https://www.cve.org/CVERecord?id=CVE-2026-4224 https://nvd.nist.gov/vuln/detail/CVE-2026-4224 https://github.com/python/cpython/commit/196edfb06a7458377d4d0f4b3cd41724c1f3bd4a https://github.com/python/cpython/commit/e0a8a6da90597a924b300debe045cdb4628ee1f3 https://github.com/python/cpython/commit/eb0e8be3a7e11b87d198a2c3af1ed0eccf532768 https://github.com/python/cpython/issues/145986 https://github.com/python/cpython/pull/145987 https://mail.python.org/archives/list/security-announce@python.org/thread/5M7CGUW3XBRY7II4DK43KF7NQQ3TPZ6R/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4224.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OLKvdPVgT9/lPcflJTxE3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;OLKvdPVgT9/lPcflJTxE3Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OPNDKUsVLJt2v1gO1zvkBA==&#34;: {&#xA;      &#34;id&#34;: &#34;OPNDKUsVLJt2v1gO1zvkBA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1632&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the bsdunzip utility of libarchive. In affected versions, a specially crafted file may trigger a null pointer dereference. This issue can lead to an application crash or other unexpected behavior. This bug does not compromise the integrity or availability of the base system.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-24T13:31:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1632 https://bugzilla.redhat.com/show_bug.cgi?id=2347309 https://www.cve.org/CVERecord?id=CVE-2025-1632 https://nvd.nist.gov/vuln/detail/CVE-2025-1632 https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc https://vuldb.com/?ctiid.296619 https://vuldb.com/?id.296619 https://vuldb.com/?submit.496460 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1632.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OTZM0RD60ajdSeEqWGkkTw==&#34;: {&#xA;      &#34;id&#34;: &#34;OTZM0RD60ajdSeEqWGkkTw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-26740&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in giflib. A remote attacker can exploit a buffer overflow vulnerability in the EGifGCBToExtension function by providing a specially crafted Graphics Control Extension (GCE) block. This allows overwriting an existing GCE block without proper size validation, leading to a denial of service (DoS) on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-26740 https://bugzilla.redhat.com/show_bug.cgi?id=2448747 https://www.cve.org/CVERecord?id=CVE-2026-26740 https://nvd.nist.gov/vuln/detail/CVE-2026-26740 https://github.com/zakkanijia/POC/blob/main/giflib/giftool/giflib_giftool_gce_len_heap_oobwrite_disclosure.md https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-26740.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OgFGrvrnAoXXvapnatTrxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;OgFGrvrnAoXXvapnatTrxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0965&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libssh where it can attempt to open arbitrary files during configuration parsing. A local attacker can exploit this by providing a malicious configuration file or when the system is misconfigured. This vulnerability could lead to a Denial of Service (DoS) by causing the system to try and access dangerous files, such as block devices or large system files, which can disrupt normal operations.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-10T18:47:22Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0965 https://bugzilla.redhat.com/show_bug.cgi?id=2436980 https://www.cve.org/CVERecord?id=CVE-2026-0965 https://nvd.nist.gov/vuln/detail/CVE-2026-0965 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0965.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Oi3Y6I7JDcoQrQyH+jMXWw==&#34;: {&#xA;      &#34;id&#34;: &#34;Oi3Y6I7JDcoQrQyH+jMXWw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14087&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14087 https://bugzilla.redhat.com/show_bug.cgi?id=2419093 https://www.cve.org/CVERecord?id=CVE-2025-14087 https://nvd.nist.gov/vuln/detail/CVE-2025-14087 https://gitlab.gnome.org/GNOME/glib/-/issues/3834 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14087.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OpUahpCA4oBceG962KxTMA==&#34;: {&#xA;      &#34;id&#34;: &#34;OpUahpCA4oBceG962KxTMA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;PcNbuWOo0ahqjfbOQhXvvQ==&#34;: {&#xA;      &#34;id&#34;: &#34;PcNbuWOo0ahqjfbOQhXvvQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-41996&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the Diffie-Hellman Ephemeral (DHE) Key Agreement Protocol, where a malicious client can exploit the server&#39;s public key validation process. By forcing the server to use DHE and validating the order of public keys, the client can trigger expensive server-side modular exponentiation calculations. This issue results in asymmetric resource consumption, potentially leading to a denial of service (DoS) attack by overwhelming the server with computationally intensive operations.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-26T06:15:04Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-41996 https://bugzilla.redhat.com/show_bug.cgi?id=2307826 https://www.cve.org/CVERecord?id=CVE-2024-41996 https://nvd.nist.gov/vuln/detail/CVE-2024-41996 https://dheatattack.gitlab.io/details/ https://dheatattack.gitlab.io/faq/ https://gist.github.com/c0r0n3r/abccc14d4d96c0442f3a77fa5ca255d1 https://github.com/openssl/openssl/issues/17374 https://openssl-library.org/post/2022-10-21-tls-groups-configuration/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-41996.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Pe4IHqZpuBtuSkrgd2HMEg==&#34;: {&#xA;      &#34;id&#34;: &#34;Pe4IHqZpuBtuSkrgd2HMEg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13034&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When configured to use public key pinning with QUIC connections and GnuTLS, and with standard certificate verification explicitly disabled, curl could bypass the intended public key check. This oversight allows a malicious server to impersonate a legitimate one, potentially leading to unauthorized access or information disclosure due to a failure in verifying the server&#39;s identity.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13034 https://bugzilla.redhat.com/show_bug.cgi?id=2426406 https://www.cve.org/CVERecord?id=CVE-2025-13034 https://nvd.nist.gov/vuln/detail/CVE-2025-13034 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13034.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Q5xJp4zJ1MCYcYbDi9qrdQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Q5xJp4zJ1MCYcYbDi9qrdQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25068&#34;,&#xA;      &#34;description&#34;: &#34;alsa-lib versions 1.2.2 up to and including 1.2.15.2, prior to commit 5f7fe33, contain a heap-based buffer overflow in the topology mixer control decoder. The tplg_decode_control_mixer1() function reads the num_channels field from untrusted .tplg data and uses it as a loop bound without validating it against the fixed-size channel array (SND_TPLG_MAX_CHAN). A crafted topology file with an excessive num_channels value can cause out-of-bounds heap writes, leading to a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-29T19:08:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25068 https://bugzilla.redhat.com/show_bug.cgi?id=2435372 https://www.cve.org/CVERecord?id=CVE-2026-25068 https://nvd.nist.gov/vuln/detail/CVE-2026-25068 https://github.com/alsa-project/alsa-lib/commit/5f7fe33002d2d98d84f72e381ec2cccc0d5d3d40 https://www.vulncheck.com/advisories/alsa-lib-topology-decoder-heap-based-buffer-overflow https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25068.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;alsa-lib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QSNBg/XspHcBwSxBTMU4rg==&#34;: {&#xA;      &#34;id&#34;: &#34;QSNBg/XspHcBwSxBTMU4rg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-50181&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in urllib3. The `PoolManager` class allows redirects to be disabled by configuring retries in a specific manner, effectively bypassing intended HTTP redirection behavior. A network attacker can leverage this configuration to manipulate request flows and disrupt service. This bypass occurs through improper handling of retry parameters during PoolManager instantiation. This issue can reult in a denial of service or unintended data exposure due to altered request destinations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-19T01:08:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-50181 https://bugzilla.redhat.com/show_bug.cgi?id=2373799 https://www.cve.org/CVERecord?id=CVE-2025-50181 https://nvd.nist.gov/vuln/detail/CVE-2025-50181 https://github.com/urllib3/urllib3/commit/f05b1329126d5be6de501f9d1e3e36738bc08857 https://github.com/urllib3/urllib3/security/advisories/GHSA-pq67-6m6q-mj2v https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-50181.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QUtTYJuHdkAOgtveagWUfA==&#34;: {&#xA;      &#34;id&#34;: &#34;QUtTYJuHdkAOgtveagWUfA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0466&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. The X509_VERIFY_PARAM_add0_policy() function is documented to enable the certificate policy check when doing certificate verification implicitly. However, implementing the function does not enable the check, allowing certificates with invalid or incorrect policies to pass the certificate verification. Suddenly enabling the policy check could break existing deployments, so it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. The applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0466 https://bugzilla.redhat.com/show_bug.cgi?id=2182565 https://www.cve.org/CVERecord?id=CVE-2023-0466 https://nvd.nist.gov/vuln/detail/CVE-2023-0466 https://www.openssl.org/news/secadv/20230328.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0466.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QcOTYeOedG0AUhPSakMpIA==&#34;: {&#xA;      &#34;id&#34;: &#34;QcOTYeOedG0AUhPSakMpIA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4741&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free vulnerability was found in OpenSSL. Calling the OpenSSL API SSL_free_buffers function may cause memory to be accessed that was previously freed in some situations.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4741 https://bugzilla.redhat.com/show_bug.cgi?id=2283757 https://www.cve.org/CVERecord?id=CVE-2024-4741 https://nvd.nist.gov/vuln/detail/CVE-2024-4741 https://www.openssl.org/news/secadv/20240528.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4741.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RVCidRUm4D1IKoPhoUi2AA==&#34;: {&#xA;      &#34;id&#34;: &#34;RVCidRUm4D1IKoPhoUi2AA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-9674&#34;,&#xA;      &#34;description&#34;: &#34;A ZIP bomb attack was found in the Python zipfile module. A remote attacker could abuse this flaw by providing a specially crafted ZIP file that, when decompressed by zipfile, would exhaust system resources resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-03-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-9674 https://bugzilla.redhat.com/show_bug.cgi?id=1800749 https://www.cve.org/CVERecord?id=CVE-2019-9674 https://nvd.nist.gov/vuln/detail/CVE-2019-9674 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-9674.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RXjd5U95osIGXnqCa34Jkg==&#34;: {&#xA;      &#34;id&#34;: &#34;RXjd5U95osIGXnqCa34Jkg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0989&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested \u003cinclude\u003e directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0989 https://bugzilla.redhat.com/show_bug.cgi?id=2429933 https://www.cve.org/CVERecord?id=CVE-2026-0989 https://nvd.nist.gov/vuln/detail/CVE-2026-0989 https://gitlab.gnome.org/GNOME/libxml2/-/issues/998 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0989.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RYqFgDYIttLgJc8B82sK/w==&#34;: {&#xA;      &#34;id&#34;: &#34;RYqFgDYIttLgJc8B82sK/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66382&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat. This vulnerability allows a denial of service (DoS) by processing a crafted file with an approximate size of 2 MiB, leading to dozens of seconds of processing time.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66382 https://bugzilla.redhat.com/show_bug.cgi?id=2417661 https://www.cve.org/CVERecord?id=CVE-2025-66382 https://nvd.nist.gov/vuln/detail/CVE-2025-66382 https://github.com/libexpat/libexpat/issues/1076 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66382.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RdjNn4dAdZKcn6VS95a/SQ==&#34;: {&#xA;      &#34;id&#34;: &#34;RdjNn4dAdZKcn6VS95a/SQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-39314&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CUPS, an open-source printing system. An unprivileged local user can exploit an integer underflow vulnerability by providing a negative job-password-supported Internet Printing Protocol (IPP) attribute. This manipulation causes the cupsd root process to crash, which can be repeatedly triggered to achieve a sustained Denial of Service (DoS) on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T16:59:23Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-39314 https://bugzilla.redhat.com/show_bug.cgi?id=2456107 https://www.cve.org/CVERecord?id=CVE-2026-39314 https://nvd.nist.gov/vuln/detail/CVE-2026-39314 https://github.com/OpenPrinting/cups/security/advisories/GHSA-pp8w-2g52-7vj7 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-39314.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Rfm1tD+QxSP/TVjKFDNabg==&#34;: {&#xA;      &#34;id&#34;: &#34;Rfm1tD+QxSP/TVjKFDNabg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0967&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular expression backtracking. This can cause timeouts and resource exhaustion, resulting in a Denial of Service (DoS) for the client.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-10T18:47:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0967 https://bugzilla.redhat.com/show_bug.cgi?id=2436981 https://www.cve.org/CVERecord?id=CVE-2026-0967 https://nvd.nist.gov/vuln/detail/CVE-2026-0967 https://www.libssh.org/2026/02/10/libssh-0-12-0-and-0-11-4-security-releases/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0967.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Rw8DyDlyRHRJOeZaAbGMRA==&#34;: {&#xA;      &#34;id&#34;: &#34;Rw8DyDlyRHRJOeZaAbGMRA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59529&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in avahi. The simple protocol server ignores the documented client limit and accepts unlimited connections, allowing for easy local Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59529 https://bugzilla.redhat.com/show_bug.cgi?id=2405338 https://www.cve.org/CVERecord?id=CVE-2025-59529 https://nvd.nist.gov/vuln/detail/CVE-2025-59529 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59529.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;S7qx7a03HASsJhyQafvXjg==&#34;: {&#xA;      &#34;id&#34;: &#34;S7qx7a03HASsJhyQafvXjg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-19211&#34;,&#xA;      &#34;description&#34;: &#34;In ncurses 6.1, there is a NULL pointer dereference at function _nc_parse_entry in parse_entry.c that will lead to a denial of service attack. The product proceeds to the dereference code path even after a \&#34;dubious character `*&#39; in name or alias field\&#34; detection.&#34;,&#xA;      &#34;issued&#34;: &#34;2018-10-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2018-19211 https://bugzilla.redhat.com/show_bug.cgi?id=1652600 https://www.cve.org/CVERecord?id=CVE-2018-19211 https://nvd.nist.gov/vuln/detail/CVE-2018-19211 https://security.access.redhat.com/data/csaf/v2/vex/2018/cve-2018-19211.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SHxE0qXbBmDEp/LL1ieJeA==&#34;: {&#xA;      &#34;id&#34;: &#34;SHxE0qXbBmDEp/LL1ieJeA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-19189&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in the ncurses library. This issue occurs when processing a crafted terminfo database, causing a heap-based buffer overflow, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-05-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-19189 https://bugzilla.redhat.com/show_bug.cgi?id=2234926 https://www.cve.org/CVERecord?id=CVE-2020-19189 https://nvd.nist.gov/vuln/detail/CVE-2020-19189 https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-19189.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SixpK4TZp5ARiPVlZlGpew==&#34;: {&#xA;      &#34;id&#34;: &#34;SixpK4TZp5ARiPVlZlGpew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4878&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2451615 https://www.cve.org/CVERecord?id=CVE-2026-4878 https://nvd.nist.gov/vuln/detail/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2447554 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4878.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;TLOrmSYL76Du+GI4WD9gMQ==&#34;: {&#xA;      &#34;id&#34;: &#34;TLOrmSYL76Du+GI4WD9gMQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34459&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the xmllint program distributed by the libxml2 package. A buffer over-read in the xmlHTMLPrintFileContext function in the xmllint.c file may be triggered when a crafted file is processed with the xmllint program using the `--htmlout` command line option, causing an application crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34459 https://bugzilla.redhat.com/show_bug.cgi?id=2280532 https://www.cve.org/CVERecord?id=CVE-2024-34459 https://nvd.nist.gov/vuln/detail/CVE-2024-34459 https://gitlab.gnome.org/GNOME/libxml2/-/issues/720 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34459.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Te9j1HGn7feNCE/Fduu0+A==&#34;: {&#xA;      &#34;id&#34;: &#34;Te9j1HGn7feNCE/Fduu0+A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-64505&#34;,&#xA;      &#34;description&#34;: &#34;A heap buffer over-read vulnerability exists in libpng&#39;s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T23:38:40Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-64505 https://bugzilla.redhat.com/show_bug.cgi?id=2416905 https://www.cve.org/CVERecord?id=CVE-2025-64505 https://nvd.nist.gov/vuln/detail/CVE-2025-64505 https://github.com/pnggroup/libpng/commit/6a528eb5fd0dd7f6de1c39d30de0e41473431c37 https://github.com/pnggroup/libpng/pull/748 https://github.com/pnggroup/libpng/security/advisories/GHSA-4952-h5wq-4m42 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-64505.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;TuBnhFrkwMqIcYtYYgNGNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;TuBnhFrkwMqIcYtYYgNGNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3784&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. This vulnerability allows curl to wrongly reuse an existing HTTP proxy connection when performing a CONNECT request to a server, even if the new request uses different authentication credentials for the HTTP proxy. This improper connection reuse could lead to an attacker gaining unauthorized access to resources or information intended for a different user.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:09:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3784 https://bugzilla.redhat.com/show_bug.cgi?id=2446449 https://www.cve.org/CVERecord?id=CVE-2026-3784 https://nvd.nist.gov/vuln/detail/CVE-2026-3784 http://www.openwall.com/lists/oss-security/2026/03/11/3 https://curl.se/docs/CVE-2026-3784.html https://curl.se/docs/CVE-2026-3784.json https://hackerone.com/reports/3584903 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3784.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UMD4nV1Ky5C5eKUMgtnKzw==&#34;: {&#xA;      &#34;id&#34;: &#34;UMD4nV1Ky5C5eKUMgtnKzw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-20193&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the src/list.c of tar. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-01-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-20193 https://bugzilla.redhat.com/show_bug.cgi?id=1917565 https://www.cve.org/CVERecord?id=CVE-2021-20193 https://nvd.nist.gov/vuln/detail/CVE-2021-20193 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-20193.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UPzTyNn8ZLXlb+bwRFPPTA==&#34;: {&#xA;      &#34;id&#34;: &#34;UPzTyNn8ZLXlb+bwRFPPTA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2650&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL resulting in a possible denial of service while translating ASN.1 object identifiers. Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience long delays when processing messages, which may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2650 https://bugzilla.redhat.com/show_bug.cgi?id=2207947 https://www.cve.org/CVERecord?id=CVE-2023-2650 https://nvd.nist.gov/vuln/detail/CVE-2023-2650 https://www.openssl.org/news/secadv/20230530.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2650.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UbmdE2pHXRFccv8l1e02Jw==&#34;: {&#xA;      &#34;id&#34;: &#34;UbmdE2pHXRFccv8l1e02Jw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4156&#34;,&#xA;      &#34;description&#34;: &#34;A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4156 https://bugzilla.redhat.com/show_bug.cgi?id=2215930 https://www.cve.org/CVERecord?id=CVE-2023-4156 https://nvd.nist.gov/vuln/detail/CVE-2023-4156 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4156.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gawk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UgHucRu0hN47CoyxGAMXTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;UgHucRu0hN47CoyxGAMXTQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28386&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. Applications using AES-CFB128 encryption or decryption on systems with AVX-512 and VAES support may experience a Denial of Service (DoS). This occurs when processing partial cipher blocks, specifically if the input buffer ends at a memory page boundary and the subsequent page is unmapped. This can lead to an out-of-bounds read of up to 15 bytes and a potential application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28386 https://bugzilla.redhat.com/show_bug.cgi?id=2451099 https://www.cve.org/CVERecord?id=CVE-2026-28386 https://nvd.nist.gov/vuln/detail/CVE-2026-28386 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28386.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UoEFDYM+Gqf2mdRJh5HUFw==&#34;: {&#xA;      &#34;id&#34;: &#34;UoEFDYM+Gqf2mdRJh5HUFw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-45582&#34;,&#xA;      &#34;description&#34;: &#34;A relative path traversal flaw was found in the gnu tar utility. When archives with relative paths are extracted without the ‘--keep-old-files’ (‘-k’), the extraction process may overwrite existing files that the current user has access to. The server may be impacted if these files are critical to the operation of some service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-45582 https://bugzilla.redhat.com/show_bug.cgi?id=2379592 https://www.cve.org/CVERecord?id=CVE-2025-45582 https://nvd.nist.gov/vuln/detail/CVE-2025-45582 https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md https://www.gnu.org/software/tar/ https://www.gnu.org/software/tar/manual/html_node/Integrity.html#Integrity https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-45582.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UyCjBcpeB0nhkRTVhUcAJQ==&#34;: {&#xA;      &#34;id&#34;: &#34;UyCjBcpeB0nhkRTVhUcAJQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-39316&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CUPS, an open-source printing system. This vulnerability, known as a use-after-free, occurs in the CUPS scheduler when temporary printers are automatically removed. The system fails to properly manage memory, leaving a pointer to a freed memory location. An attacker could exploit this to cause the CUPS daemon to crash, leading to a denial of service. In more severe scenarios, this could potentially allow an attacker to execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T17:00:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-39316 https://bugzilla.redhat.com/show_bug.cgi?id=2456120 https://www.cve.org/CVERecord?id=CVE-2026-39316 https://nvd.nist.gov/vuln/detail/CVE-2026-39316 https://github.com/OpenPrinting/cups/security/advisories/GHSA-pjv5-prqp-46rg https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-39316.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VLzwKVDYC7fQrtcpCzjXjA==&#34;: {&#xA;      &#34;id&#34;: &#34;VLzwKVDYC7fQrtcpCzjXjA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VPoF+qCqaQ4y2sVl2255/g==&#34;: {&#xA;      &#34;id&#34;: &#34;VPoF+qCqaQ4y2sVl2255/g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33416&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a library used for processing PNG (Portable Network Graphics) image files. This vulnerability arises from improper memory management where a heap-allocated buffer is aliased between internal data structures. When specific functions are called, a freed memory region can still be referenced, leading to a use-after-free condition. An attacker could potentially exploit this to achieve arbitrary code execution or cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-26T16:48:54Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33416 https://bugzilla.redhat.com/show_bug.cgi?id=2451805 https://www.cve.org/CVERecord?id=CVE-2026-33416 https://nvd.nist.gov/vuln/detail/CVE-2026-33416 https://github.com/pnggroup/libpng/commit/23019269764e35ed8458e517f1897bd3c54820eb https://github.com/pnggroup/libpng/commit/7ea9eea884a2328cc7fdcb3c0c00246a50d90667 https://github.com/pnggroup/libpng/commit/a3a21443ed12bfa1ef46fa0d4fb2b74a0fa34a25 https://github.com/pnggroup/libpng/commit/c1b0318b393c90679e6fa5bc1d329fd5d5012ec1 https://github.com/pnggroup/libpng/pull/824 https://github.com/pnggroup/libpng/security/advisories/GHSA-m4pc-p4q3-4c7j https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33416.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VsocCwaFpF6PzdX5PxR+sQ==&#34;: {&#xA;      &#34;id&#34;: &#34;VsocCwaFpF6PzdX5PxR+sQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-19185&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in the ncurses library. This issue occurs when processing a crafted terminfo database, causing a heap-based buffer overflow, resulting in an application crash, causing denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-05-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-19185 https://bugzilla.redhat.com/show_bug.cgi?id=2234924 https://www.cve.org/CVERecord?id=CVE-2020-19185 https://nvd.nist.gov/vuln/detail/CVE-2020-19185 https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-19185.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;W/DMqBRMDYVkVH3D67luGg==&#34;: {&#xA;      &#34;id&#34;: &#34;W/DMqBRMDYVkVH3D67luGg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-64118&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in node-tar, a Tar utility for Node.js. This vulnerability allows a local attacker to potentially disclose sensitive information. When the .t (or .list) function is used with { sync: true } to read tar entry contents, and the tar file is concurrently modified on disk to a smaller size, the function may return uninitialized memory contents. This could lead to the exposure of arbitrary data.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-30T17:50:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-64118 https://bugzilla.redhat.com/show_bug.cgi?id=2407440 https://www.cve.org/CVERecord?id=CVE-2025-64118 https://nvd.nist.gov/vuln/detail/CVE-2025-64118 https://github.com/isaacs/node-tar/commit/5330eb04bc43014f216e5c271b40d5c00d45224d https://github.com/isaacs/node-tar/issues/445 https://github.com/isaacs/node-tar/pull/446 https://github.com/isaacs/node-tar/security/advisories/GHSA-29xp-372q-xqph https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-64118.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;W/d4trZ7jb2yxjrq4cNOWA==&#34;: {&#xA;      &#34;id&#34;: &#34;W/d4trZ7jb2yxjrq4cNOWA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3219&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in GnuPG. GnuPG can spin on a relatively small input by crafting a public key with thousands of signatures attached and compressed down to a few kilobytes. This issue can potentially cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://www.cve.org/CVERecord?id=CVE-2022-3219 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://dev.gnupg.org/D556 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3219.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WGvgNwrW2u5APZcidQ6v1Q==&#34;: {&#xA;      &#34;id&#34;: &#34;WGvgNwrW2u5APZcidQ6v1Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27456&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. When an /etc/fstab entry is configured with the user,loop options, the `mount` program checks the file path with user permissions but later opens it with root privileges. This creates a brief Time-of-Check-Time-of-Use (TOCTOU) window where an attacker can substitute the intended file with a malicious symbolic link. This allows a local unprivileged user to mount any root-owned file or block device that contains a valid filesystem, gaining full read access to its contents.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-03T21:23:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27456 https://bugzilla.redhat.com/show_bug.cgi?id=2454956 https://www.cve.org/CVERecord?id=CVE-2026-27456 https://nvd.nist.gov/vuln/detail/CVE-2026-27456 https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4 https://github.com/util-linux/util-linux/releases/tag/v2.41.4 https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27456.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WcChSpNAL6V9Xfxc9AqW7g==&#34;: {&#xA;      &#34;id&#34;: &#34;WcChSpNAL6V9Xfxc9AqW7g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;X37PWFfcTFBuBxL2613UQg==&#34;: {&#xA;      &#34;id&#34;: &#34;X37PWFfcTFBuBxL2613UQg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4786&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python webbrowser.open() API. If a specially crafted URL containing \&#34;%action\&#34; is processed, an attacker could bypass a previous mitigation for CVE-2026-4519. This bypass allows for command injection into the underlying shell, potentially leading to arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-13T21:52:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4786 https://bugzilla.redhat.com/show_bug.cgi?id=2458049 https://www.cve.org/CVERecord?id=CVE-2026-4786 https://nvd.nist.gov/vuln/detail/CVE-2026-4786 https://github.com/python/cpython/issues/148169 https://github.com/python/cpython/pull/148170 https://mail.python.org/archives/list/security-announce@python.org/thread/JQDUNJVB4AQNTJECSUKOBDU3XCJIPSE5/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4786.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XBiy/XVR6SoThCkYUmkD1g==&#34;: {&#xA;      &#34;id&#34;: &#34;XBiy/XVR6SoThCkYUmkD1g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33056&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tar-rs, a Rust library for reading and writing tar archives. When unpacking a crafted tar archive, an attacker can exploit a symbolic link vulnerability. By including a symlink followed by a directory with the same name, the library incorrectly applies file permissions to the symlink&#39;s target. This allows an attacker to modify the permissions of arbitrary directories outside the intended extraction location.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-20T07:11:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33056 https://bugzilla.redhat.com/show_bug.cgi?id=2449490 https://www.cve.org/CVERecord?id=CVE-2026-33056 https://nvd.nist.gov/vuln/detail/CVE-2026-33056 https://github.com/alexcrichton/tar-rs/commit/17b1fd84e632071cb8eef9d3709bf347bd266446 https://github.com/alexcrichton/tar-rs/security/advisories/GHSA-j4xf-2g29-59ph https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33056.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XXiaw1EwhFkuilI94EKiqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;XXiaw1EwhFkuilI94EKiqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5713&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. A malicious Python process could exploit the \&#34;profiling.sampling\&#34; module and \&#34;asyncio introspection capabilities\&#34; to read and write memory addresses within a privileged process. This vulnerability occurs when the privileged process connects to the malicious process via its remote debugging feature, potentially leading to information disclosure and arbitrary code execution. Successful exploitation requires repeated connections, which may cause instability in the connecting process.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-14T15:11:51Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5713 https://bugzilla.redhat.com/show_bug.cgi?id=2458239 https://www.cve.org/CVERecord?id=CVE-2026-5713 https://nvd.nist.gov/vuln/detail/CVE-2026-5713 https://github.com/python/cpython/issues/148178 https://github.com/python/cpython/pull/148187 https://mail.python.org/archives/list/security-announce@python.org/thread/OG4RHARYSNIE22GGOMVMCRH76L5HKPLM/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5713.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XbpXfbeApuDuIKvY0/qWiA==&#34;: {&#xA;      &#34;id&#34;: &#34;XbpXfbeApuDuIKvY0/qWiA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3731&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libssh. A remote attacker could trigger an out-of-bounds read vulnerability in the SFTP Extension Name Handler by manipulating the `idx` argument in the `sftp_extensions_get_name` or `sftp_extensions_get_data` functions. This could lead to a Denial of Service (DoS), making the affected system unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-08T10:32:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3731 https://bugzilla.redhat.com/show_bug.cgi?id=2445579 https://www.cve.org/CVERecord?id=CVE-2026-3731 https://nvd.nist.gov/vuln/detail/CVE-2026-3731 https://gitlab.com/libssh/libssh-mirror/-/commit/855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60 https://vuldb.com/?ctiid.349709 https://vuldb.com/?id.349709 https://vuldb.com/?submit.767120 https://www.libssh.org/files/0.12/libssh-0.12.0.tar.xz https://www.libssh.org/security/advisories/libssh-2026-sftp-extensions.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3731.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XygysGe2kdlyCRQHM1fu3w==&#34;: {&#xA;      &#34;id&#34;: &#34;XygysGe2kdlyCRQHM1fu3w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5917&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw involves an &#39;off-by-one&#39; miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation. This bug affects libarchive versions prior to 3.8.0.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5917 https://bugzilla.redhat.com/show_bug.cgi?id=2370874 https://www.cve.org/CVERecord?id=CVE-2025-5917 https://nvd.nist.gov/vuln/detail/CVE-2025-5917 https://github.com/libarchive/libarchive/pull/2588 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5917.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YiJlkUTKf0/7+ORZMmQ2cw==&#34;: {&#xA;      &#34;id&#34;: &#34;YiJlkUTKf0/7+ORZMmQ2cw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-25724&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libarchive package. Affected versions of libarchive do not check a strftime return value, which can lead to a denial of service or unspecified other impacts via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-25724 https://bugzilla.redhat.com/show_bug.cgi?id=2349221 https://www.cve.org/CVERecord?id=CVE-2025-25724 https://nvd.nist.gov/vuln/detail/CVE-2025-25724 https://gist.github.com/Ekkosun/a83870ce7f3b7813b9b462a395e8ad92 https://github.com/Ekkosun/pocs/blob/main/bsdtarbug https://github.com/libarchive/libarchive/blob/b439d586f53911c84be5e380445a8a259e19114c/tar/util.c#L751-L752 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-25724.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YoCxZvEp16Bt9LDv+Ficeg==&#34;: {&#xA;      &#34;id&#34;: &#34;YoCxZvEp16Bt9LDv+Ficeg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-64506&#34;,&#xA;      &#34;description&#34;: &#34;A buffer over read flaw has been discovered in libpng. A heap buffer over-read vulnerability exists in libpng&#39;s png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T23:41:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-64506 https://bugzilla.redhat.com/show_bug.cgi?id=2416906 https://www.cve.org/CVERecord?id=CVE-2025-64506 https://nvd.nist.gov/vuln/detail/CVE-2025-64506 https://github.com/pnggroup/libpng/commit/2bd84c019c300b78e811743fbcddb67c9d9bf821 https://github.com/pnggroup/libpng/pull/749 https://github.com/pnggroup/libpng/security/advisories/GHSA-qpr4-xm66-hww6 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-64506.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZTGiJlkqcqrCLJSY/Sq8lA==&#34;: {&#xA;      &#34;id&#34;: &#34;ZTGiJlkqcqrCLJSY/Sq8lA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-19186&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in the ncurses library. This issue occurs when processing a crafted terminfo database, causing a buffer over-read, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-05-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-19186 https://bugzilla.redhat.com/show_bug.cgi?id=2234908 https://www.cve.org/CVERecord?id=CVE-2020-19186 https://nvd.nist.gov/vuln/detail/CVE-2020-19186 https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-19186.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZkEez7f24VNVhTaTCDhuEg==&#34;: {&#xA;      &#34;id&#34;: &#34;ZkEez7f24VNVhTaTCDhuEg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZlxfTVb/4bi6yWQ+JLaOnw==&#34;: {&#xA;      &#34;id&#34;: &#34;ZlxfTVb/4bi6yWQ+JLaOnw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2297&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CPython. This vulnerability allows a local user with low privileges to bypass security auditing mechanisms. The issue occurs because the SourcelessFileLoader component, responsible for handling older Python compiled files (.pyc), does not properly trigger system audit events. This oversight could enable malicious activities to go undetected, compromising the integrity of the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-04T22:10:43Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2297 https://bugzilla.redhat.com/show_bug.cgi?id=2444691 https://www.cve.org/CVERecord?id=CVE-2026-2297 https://nvd.nist.gov/vuln/detail/CVE-2026-2297 https://github.com/python/cpython/commit/482d6f8bdba9da3725d272e8bb4a2d25fb6a603e https://github.com/python/cpython/commit/a51b1b512de1d56b3714b65628a2eae2b07e535e https://github.com/python/cpython/commit/e58e9802b9bec5cdbf48fc9bf1da5f4fda482e86 https://github.com/python/cpython/issues/145506 https://github.com/python/cpython/pull/145507 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2297.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Znm2hdK/FULQhTTGTVX59Q==&#34;: {&#xA;      &#34;id&#34;: &#34;Znm2hdK/FULQhTTGTVX59Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3783&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an OAuth2 bearer token is used for an HTTP(S) transfer that redirects to a second URL, curl could unintentionally leak the token. This occurs if the second hostname has entries in the `.netrc` file, allowing the bearer token intended for the first host to be sent to the redirected host. This information disclosure could allow an attacker to gain unauthorized access.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:09:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3783 https://bugzilla.redhat.com/show_bug.cgi?id=2446450 https://www.cve.org/CVERecord?id=CVE-2026-3783 https://nvd.nist.gov/vuln/detail/CVE-2026-3783 http://www.openwall.com/lists/oss-security/2026/03/11/2 https://curl.se/docs/CVE-2026-3783.html https://curl.se/docs/CVE-2026-3783.json https://hackerone.com/reports/3583983 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3783.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Zp9+pixFuNBueE2yO610gQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Zp9+pixFuNBueE2yO610gQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-56433&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in shadow-utils. Affected versions of shadow-utils establish a default /etc/subuid behavior, for example, uid 100000 through 165535 for the first user account, that can conflict with the uids of users defined on locally administered networks. This issue potentially leads to account takeover by leveraging newuidmap for access to an NFS home directory or same-host resources for remote logins by these local network users.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-12-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-56433 https://bugzilla.redhat.com/show_bug.cgi?id=2334165 https://www.cve.org/CVERecord?id=CVE-2024-56433 https://nvd.nist.gov/vuln/detail/CVE-2024-56433 https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241 https://github.com/shadow-maint/shadow/issues/1157 https://github.com/shadow-maint/shadow/releases/tag/4.4 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-56433.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZvX4VR3jvMBd1Wq+RxNTgg==&#34;: {&#xA;      &#34;id&#34;: &#34;ZvX4VR3jvMBd1Wq+RxNTgg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-35512&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free flaw was found in D-Bus when a system has multiple usernames sharing the same UID. When a set of policy rules references these usernames, D-Bus may free some memory in the heap, which is still used by data structures necessary for the other usernames sharing the UID, possibly leading to a crash or other undefined behaviors.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-35512 https://bugzilla.redhat.com/show_bug.cgi?id=1909101 https://www.cve.org/CVERecord?id=CVE-2020-35512 https://nvd.nist.gov/vuln/detail/CVE-2020-35512 https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-35512.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dbus&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;a067YUjLHWzR99JNl/RtGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;a067YUjLHWzR99JNl/RtGQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;avzu5SRbIjcduH4QdmZ1gg==&#34;: {&#xA;      &#34;id&#34;: &#34;avzu5SRbIjcduH4QdmZ1gg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0966&#34;,&#xA;      &#34;description&#34;: &#34;The API function `ssh_get_hexa()` is vulnerable, when 0-lenght\ninput is provided to this function. This function is used internally\nin `ssh_get_fingerprint_hash()` and `ssh_print_hexa()` (deprecated),\nwhich is vulnerable to the same input (length is provided by the\ncalling application).\n\nThe function is also used internally in the gssapi code for logging\nthe OIDs received by the server during GSSAPI authentication. This\ncould be triggered remotely, when the server allows GSSAPI authentication\nand logging verbosity is set at least to SSH_LOG_PACKET (3). This\ncould cause self-DoS of the per-connection daemon process.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-10T18:47:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0966 https://bugzilla.redhat.com/show_bug.cgi?id=2433121 https://www.cve.org/CVERecord?id=CVE-2026-0966 https://nvd.nist.gov/vuln/detail/CVE-2026-0966 https://www.libssh.org/2026/02/10/libssh-0-12-0-and-0-11-4-security-releases/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0966.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cCowLuOsLfTMmPFOoqUVww==&#34;: {&#xA;      &#34;id&#34;: &#34;cCowLuOsLfTMmPFOoqUVww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0397&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Python. A defect was discovered in the Python “ssl” module where there is a memory race condition with the ssl.SSLContext methods “cert_store_stats()” and “get_ca_certs()”. The race condition can be triggered if the methods are called at the same time that certificates are loaded into the SSLContext, such as during the TLS handshake with a  configured certificate directory.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0397 https://bugzilla.redhat.com/show_bug.cgi?id=2301891 https://www.cve.org/CVERecord?id=CVE-2024-0397 https://nvd.nist.gov/vuln/detail/CVE-2024-0397 https://mail.python.org/archives/list/security-announce@python.org/thread/BMAK5BCGKYWNJOACVUSLUF6SFGBIM4VP/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0397.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cW+DgNrGAeRAwNB4wrDZhw==&#34;: {&#xA;      &#34;id&#34;: &#34;cW+DgNrGAeRAwNB4wrDZhw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22695&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a reference library for processing PNG (Portable Network Graphics) image files. A local attacker could exploit a heap buffer over-read vulnerability in the `png_image_finish_read` function by tricking a user into processing a specially crafted interlaced 16-bit PNG file with an 8-bit output format and non-minimal row stride. This could lead to a denial of service (DoS) and potentially information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T22:55:40Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22695 https://bugzilla.redhat.com/show_bug.cgi?id=2428825 https://www.cve.org/CVERecord?id=CVE-2026-22695 https://nvd.nist.gov/vuln/detail/CVE-2026-22695 https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea https://github.com/pnggroup/libpng/commit/e4f7ad4ea2 https://github.com/pnggroup/libpng/issues/778 https://github.com/pnggroup/libpng/security/advisories/GHSA-mmq5-27w3-rxpp https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22695.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cqYWiTibDLM7aibErMKang==&#34;: {&#xA;      &#34;id&#34;: &#34;cqYWiTibDLM7aibErMKang==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4437&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc (the GNU C Library). When an application uses the `gethostbyaddr` or `gethostbyaddr_r` functions with a `nsswitch.conf` configuration that specifies glibc&#39;s DNS backend, a remote attacker can send a specially crafted DNS (Domain Name System) response. This crafted response can cause the application to incorrectly interpret a non-answer section of the DNS response as a valid answer, leading to potential misbehavior or incorrect information processing.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-20T19:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4437 https://bugzilla.redhat.com/show_bug.cgi?id=2449777 https://www.cve.org/CVERecord?id=CVE-2026-4437 https://nvd.nist.gov/vuln/detail/CVE-2026-4437 https://sourceware.org/bugzilla/show_bug.cgi?id=34014 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4437.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;crmilTSJ/pTSPBKY9EJmZg==&#34;: {&#xA;      &#34;id&#34;: &#34;crmilTSJ/pTSPBKY9EJmZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14524&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an OAuth2 (Open Authorization) bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a different scheme like IMAP, LDAP, POP3, or SMTP, curl might incorrectly pass the bearer token to the new target host. This could lead to information disclosure, where sensitive authentication tokens are exposed to unintended recipients.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14524 https://bugzilla.redhat.com/show_bug.cgi?id=2426407 https://www.cve.org/CVERecord?id=CVE-2025-14524 https://nvd.nist.gov/vuln/detail/CVE-2025-14524 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14524.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eCNdMtt9JN2Rrb8I23NIsA==&#34;: {&#xA;      &#34;id&#34;: &#34;eCNdMtt9JN2Rrb8I23NIsA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34990&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenPrinting CUPS. A local unprivileged user can exploit this vulnerability by coercing the `cupsd` service to authenticate to an attacker-controlled Internet Printing Protocol (IPP) service. This allows the user to create a persistent printer queue that can overwrite arbitrary files with root privileges. Successful exploitation can lead to privilege escalation and arbitrary root command execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-03T21:14:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34990 https://bugzilla.redhat.com/show_bug.cgi?id=2454947 https://www.cve.org/CVERecord?id=CVE-2026-34990 https://nvd.nist.gov/vuln/detail/CVE-2026-34990 https://github.com/OpenPrinting/cups/security/advisories/GHSA-c54j-2vqw-wpwp https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34990.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eohUFw28jV3sGLZE2CBPXA==&#34;: {&#xA;      &#34;id&#34;: &#34;eohUFw28jV3sGLZE2CBPXA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4878&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libssh, where an uninitialized variable exists under certain conditions in the privatekey_from_file() function. This flaw can be triggered if the file specified by the filename doesn&#39;t exist and may lead to possible signing failures or heap corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2376184 https://www.cve.org/CVERecord?id=CVE-2025-4878 https://nvd.nist.gov/vuln/detail/CVE-2025-4878 https://git.libssh.org/projects/libssh.git/commit/?id=697650caa97eaf7623924c75f9fcfec6dd423cd1 https://git.libssh.org/projects/libssh.git/commit/?id=b35ee876adc92a208d47194772e99f9c71e0bedb https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4878.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eqoqeJN8gMUINJLH2PXP7g==&#34;: {&#xA;      &#34;id&#34;: &#34;eqoqeJN8gMUINJLH2PXP7g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-1000654&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.&#34;,&#xA;      &#34;issued&#34;: &#34;2018-08-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2018-1000654 https://bugzilla.redhat.com/show_bug.cgi?id=1621972 https://www.cve.org/CVERecord?id=CVE-2018-1000654 https://nvd.nist.gov/vuln/detail/CVE-2018-1000654 https://security.access.redhat.com/data/csaf/v2/vex/2018/cve-2018-1000654.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fXpWtuXNPi3tb2edhk37bw==&#34;: {&#xA;      &#34;id&#34;: &#34;fXpWtuXNPi3tb2edhk37bw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2236&#34;,&#xA;      &#34;description&#34;: &#34;A timing-based side-channel flaw was found in libgcrypt&#39;s RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2236 https://bugzilla.redhat.com/show_bug.cgi?id=2245218 https://www.cve.org/CVERecord?id=CVE-2024-2236 https://nvd.nist.gov/vuln/detail/CVE-2024-2236 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2236.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fayrPya6DVXP9weWvA6obQ==&#34;: {&#xA;      &#34;id&#34;: &#34;fayrPya6DVXP9weWvA6obQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-7264&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcurl, where libcurl&#39;s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the *time fraction*, leading to a `strlen()` performed on a pointer to a heap buffer area that is not purposely NULL terminated.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7264 https://bugzilla.redhat.com/show_bug.cgi?id=2301888 https://www.cve.org/CVERecord?id=CVE-2024-7264 https://nvd.nist.gov/vuln/detail/CVE-2024-7264 https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7264.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fvGjL9hw9hDQockMTb7lrA==&#34;: {&#xA;      &#34;id&#34;: &#34;fvGjL9hw9hDQockMTb7lrA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-4209&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference flaw was found in GnuTLS. As Nettle&#39;s hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-12-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-4209 https://bugzilla.redhat.com/show_bug.cgi?id=2044156 https://www.cve.org/CVERecord?id=CVE-2021-4209 https://nvd.nist.gov/vuln/detail/CVE-2021-4209 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-4209.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gaFOKxy9D9KR/Iyd+kDZoA==&#34;: {&#xA;      &#34;id&#34;: &#34;gaFOKxy9D9KR/Iyd+kDZoA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-50182&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in urllib3. The library fails to properly validate redirect URLs, allowing an attacker to manipulate redirect chains when used in environments like Pyodide utilizing the JavaScript Fetch API. This lack of validation can enable a remote attacker to control the redirect destination, leading to arbitrary URL redirection. Consequently, an attacker can redirect users to malicious websites. This \nvulnerability stems from a failure to constrain the redirect target.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-19T01:42:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-50182 https://bugzilla.redhat.com/show_bug.cgi?id=2373800 https://www.cve.org/CVERecord?id=CVE-2025-50182 https://nvd.nist.gov/vuln/detail/CVE-2025-50182 https://github.com/urllib3/urllib3/commit/7eb4a2aafe49a279c29b6d1f0ed0f42e9736194f https://github.com/urllib3/urllib3/security/advisories/GHSA-48p4-8xcf-vxj5 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-50182.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gagftKXuSuh9pi4dRu9yPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;gagftKXuSuh9pi4dRu9yPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2511&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A malicious client can trigger an uncontrolled memory consumption, resulting in a Denial of Service. This issue occurs due to OpenSSL&#39;s TLSv1.3 session cache going into an incorrect state, leading to it failing to flush properly as it fills. OpenSSL must be configured with the non-default SSL_OP_NO_TICKET option enabled to be vulnerable. This issue only affects TLSv1.3 servers, while TLS clients are not affected.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2511 https://bugzilla.redhat.com/show_bug.cgi?id=2274020 https://www.cve.org/CVERecord?id=CVE-2024-2511 https://nvd.nist.gov/vuln/detail/CVE-2024-2511 https://www.openssl.org/news/vulnerabilities.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2511.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;h6rS2s3xilGaG0a+pIjl8A==&#34;: {&#xA;      &#34;id&#34;: &#34;h6rS2s3xilGaG0a+pIjl8A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3644&#34;,&#xA;      &#34;description&#34;: &#34;A control character validation flaw has been discovered in the Python http.cookie module. The Morsel.update(), |= operator, and unpickling paths were not patched to resolve  CVE-2026-0672, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-16T17:37:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3644 https://bugzilla.redhat.com/show_bug.cgi?id=2448168 https://www.cve.org/CVERecord?id=CVE-2026-3644 https://nvd.nist.gov/vuln/detail/CVE-2026-3644 https://github.com/python/cpython/commit/57e88c1cf95e1481b94ae57abe1010469d47a6b4 https://github.com/python/cpython/issues/145599 https://github.com/python/cpython/pull/145600 https://mail.python.org/archives/list/security-announce@python.org/thread/H6CADMBCDRFGWCMOXWUIHFJNV43GABJ7/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3644.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hfBpyVezkUAf98QWnlvzIA==&#34;: {&#xA;      &#34;id&#34;: &#34;hfBpyVezkUAf98QWnlvzIA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34743&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in XZ Utils. When the `lzma_index_decoder()` function processes an empty index, and a subsequent `lzma_index_append()` operation is performed, insufficient memory is allocated. This can lead to a buffer overflow, potentially causing a denial of service (DoS) for affected systems.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T18:36:37Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34743 https://bugzilla.redhat.com/show_bug.cgi?id=2454589 https://www.cve.org/CVERecord?id=CVE-2026-34743 https://nvd.nist.gov/vuln/detail/CVE-2026-34743 https://github.com/tukaani-project/xz/commit/c8c22869e780ff57c96b46939c3d79ff99395f87 https://github.com/tukaani-project/xz/releases/tag/v5.8.3 https://github.com/tukaani-project/xz/security/advisories/GHSA-x872-m794-cxhv https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34743.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hkP7fdNBNcMv5alTtw0c+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;hkP7fdNBNcMv5alTtw0c+Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13151&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libtasn1. A remote attacker could exploit a stack-based buffer overflow vulnerability in the `asn1_expend_octet_string` function. This occurs due to a failure in validating the size of input data. Successful exploitation can lead to a Denial of Service (DoS) condition, making the affected system or application unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T21:14:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13151 https://bugzilla.redhat.com/show_bug.cgi?id=2427698 https://www.cve.org/CVERecord?id=CVE-2025-13151 https://nvd.nist.gov/vuln/detail/CVE-2025-13151 https://gitlab.com/gnutls/libtasn1 https://gitlab.com/gnutls/libtasn1/-/merge_requests/121 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13151.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ho4M6//kfDyE5kZ9fbpV0g==&#34;: {&#xA;      &#34;id&#34;: &#34;ho4M6//kfDyE5kZ9fbpV0g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14819&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcurl. When handling secure connections (TLS) and reusing connection settings, libcurl could incorrectly apply a cached security setting related to certificate chain validation. This could allow libcurl to accept a server&#39;s security certificate that it should have otherwise rejected, potentially compromising the integrity of the secure connection.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14819 https://bugzilla.redhat.com/show_bug.cgi?id=2426408 https://www.cve.org/CVERecord?id=CVE-2025-14819 https://nvd.nist.gov/vuln/detail/CVE-2025-14819 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14819.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iEGZHZXt8HWPSM5eJesddQ==&#34;: {&#xA;      &#34;id&#34;: &#34;iEGZHZXt8HWPSM5eJesddQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-7039&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-7039 https://bugzilla.redhat.com/show_bug.cgi?id=2392423 https://www.cve.org/CVERecord?id=CVE-2025-7039 https://nvd.nist.gov/vuln/detail/CVE-2025-7039 https://gitlab.gnome.org/GNOME/glib/-/issues/3716 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-7039.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;icj6a8bc4dYK/DJNvkU0+A==&#34;: {&#xA;      &#34;id&#34;: &#34;icj6a8bc4dYK/DJNvkU0+A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41409&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in PCRE2, where it is susceptible to an integer overflow vulnerability triggered by a negative repeat value in the pcre2test subject line that causes infinite looping. This flaw allows a remote attacker to pass specially crafted data to the application, initiating an integer overflow and executing a denial of service (DoS) attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41409 https://bugzilla.redhat.com/show_bug.cgi?id=2260814 https://www.cve.org/CVERecord?id=CVE-2022-41409 https://nvd.nist.gov/vuln/detail/CVE-2022-41409 https://github.com/PCRE2Project/pcre2/commit/94e1c001761373b7d9450768aa15d04c25547a35 https://github.com/PCRE2Project/pcre2/issues/141 https://github.com/advisories/GHSA-4qfx-v7wh-3q4j https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41409.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ieASPdYzGxWke8nZZhE02Q==&#34;: {&#xA;      &#34;id&#34;: &#34;ieASPdYzGxWke8nZZhE02Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-20657&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the demangle_template function in GNU libiberty, as distributed in GNU Binutils, where a memory leak could occur, a specially crafted file could cause the application to consume excessive memory, potentially leading to a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2018-12-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2018-20657 https://bugzilla.redhat.com/show_bug.cgi?id=1664708 https://www.cve.org/CVERecord?id=CVE-2018-20657 https://nvd.nist.gov/vuln/detail/CVE-2018-20657 https://security.access.redhat.com/data/csaf/v2/vex/2018/cve-2018-20657.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;j1KIfSLRyAo+5FqbDzJbtg==&#34;: {&#xA;      &#34;id&#34;: &#34;j1KIfSLRyAo+5FqbDzJbtg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5278&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNU Coreutils. The sort utility&#39;s begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5278 https://bugzilla.redhat.com/show_bug.cgi?id=2368764 https://www.cve.org/CVERecord?id=CVE-2025-5278 https://nvd.nist.gov/vuln/detail/CVE-2025-5278 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5278.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jguV9kU5iHC5V/cF3+b/tg==&#34;: {&#xA;      &#34;id&#34;: &#34;jguV9kU5iHC5V/cF3+b/tg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3360&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-3360 https://bugzilla.redhat.com/show_bug.cgi?id=2357754 https://www.cve.org/CVERecord?id=CVE-2025-3360 https://nvd.nist.gov/vuln/detail/CVE-2025-3360 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3360.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jw1ZiDut5Ot+DyVFjCrixg==&#34;: {&#xA;      &#34;id&#34;: &#34;jw1ZiDut5Ot+DyVFjCrixg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-19188&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ncurses library. This issue occurs when processing a crafted terminfo database, causing a stack-based buffer overflow, resulting in an application crash, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-05-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-19188 https://bugzilla.redhat.com/show_bug.cgi?id=2234913 https://www.cve.org/CVERecord?id=CVE-2020-19188 https://nvd.nist.gov/vuln/detail/CVE-2020-19188 https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-19188.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kCsMurCi7F77HxJoLqd9jA==&#34;: {&#xA;      &#34;id&#34;: &#34;kCsMurCi7F77HxJoLqd9jA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34978&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenPrinting CUPS. A remote attacker can exploit a path traversal vulnerability in the RSS notifier by manipulating the `notify-recipient-uri`. This allows writing arbitrary RSS XML data to sensitive files outside the intended directory. This can lead to a denial of service (DoS) by corrupting critical system files, such as the job cache, causing the scheduler to fail and previously queued jobs to disappear.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-03T21:15:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34978 https://bugzilla.redhat.com/show_bug.cgi?id=2454957 https://www.cve.org/CVERecord?id=CVE-2026-34978 https://nvd.nist.gov/vuln/detail/CVE-2026-34978 https://github.com/OpenPrinting/cups/security/advisories/GHSA-f53q-7mxp-9gcr https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34978.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kYYDrncBncmKkmFnSd5t3w==&#34;: {&#xA;      &#34;id&#34;: &#34;kYYDrncBncmKkmFnSd5t3w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-6519&#34;,&#xA;      &#34;description&#34;: &#34;avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive  information from the responding device via port-5353 UDP packets.  NOTE: this may overlap CVE-2015-2809.&#34;,&#xA;      &#34;issued&#34;: &#34;2015-03-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2017-6519 https://bugzilla.redhat.com/show_bug.cgi?id=1426712 https://www.cve.org/CVERecord?id=CVE-2017-6519 https://nvd.nist.gov/vuln/detail/CVE-2017-6519 https://www.kb.cert.org/vuls/id/550620 https://security.access.redhat.com/data/csaf/v2/vex/2017/cve-2017-6519.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;klCkJxhhNVG564GOUQMh+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;klCkJxhhNVG564GOUQMh+Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5745&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. A NULL pointer dereference vulnerability exists in the ACL parsing logic, specifically within the archive_acl_from_text_nl() function. When processing a malformed ACL string (such as a bare \&#34;d\&#34; or \&#34;default\&#34; tag without subsequent fields), the function fails to perform adequate validation before advancing the pointer. An attacker can exploit this by providing a maliciously crafted archive, causing an application utilizing the libarchive API (such as bsdtar) to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5745 https://bugzilla.redhat.com/show_bug.cgi?id=2455921 https://www.cve.org/CVERecord?id=CVE-2026-5745 https://nvd.nist.gov/vuln/detail/CVE-2026-5745 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5745.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;m8ueKfgkaYIYTU+xtIQcwA==&#34;: {&#xA;      &#34;id&#34;: &#34;m8ueKfgkaYIYTU+xtIQcwA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3857&#34;,&#xA;      &#34;description&#34;: &#34;[REJECTED CVE] A issue has been identified with libpng in png_setup_paeth_row() function. A crafted PNG image from a n attacker can lead to a segmentation fault and Denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-11-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3857 https://bugzilla.redhat.com/show_bug.cgi?id=2142600 https://www.cve.org/CVERecord?id=CVE-2022-3857 https://nvd.nist.gov/vuln/detail/CVE-2022-3857 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3857.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mRazAXjBcgFrTolNDZHDsA==&#34;: {&#xA;      &#34;id&#34;: &#34;mRazAXjBcgFrTolNDZHDsA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6069&#34;,&#xA;      &#34;description&#34;: &#34;A denial-of-service (DoS) vulnerability has been discovered in Python&#39;s html.parser.HTMLParser class. When processing specially malformed HTML input, the parsing runtime can become quadratic with respect to the input size. This significantly increased processing time can lead to excessive resource consumption, ultimately causing a denial-of-service condition in applications that rely on this parser.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-17T13:39:46Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6069 https://bugzilla.redhat.com/show_bug.cgi?id=2373234 https://www.cve.org/CVERecord?id=CVE-2025-6069 https://nvd.nist.gov/vuln/detail/CVE-2025-6069 https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949 https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41 https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b https://github.com/python/cpython/issues/135462 https://github.com/python/cpython/pull/135464 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6069.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mVT54HSCxoOy6IF9Noa/Zw==&#34;: {&#xA;      &#34;id&#34;: &#34;mVT54HSCxoOy6IF9Noa/Zw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6100&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s decompression modules, including `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile`. This vulnerability, a use-after-free, can occur if a program attempts to re-use a decompression object after a memory allocation error, especially when the system is experiencing high memory usage. Exploitation of this flaw could potentially allow an attacker to execute arbitrary code or access sensitive data. The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-13T17:15:47Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6100 https://bugzilla.redhat.com/show_bug.cgi?id=2457932 https://www.cve.org/CVERecord?id=CVE-2026-6100 https://nvd.nist.gov/vuln/detail/CVE-2026-6100 https://github.com/python/cpython/commit/6a5f79c8d7bbf22b083b240910c7a8781a59437d https://github.com/python/cpython/commit/8fc66aef6d7b3ae58f43f5c66f9366cc8cbbfcd2 https://github.com/python/cpython/commit/c3cf71c3366fe49acb776a639405c0eea6169c20 https://github.com/python/cpython/issues/148395 https://github.com/python/cpython/pull/148396 https://mail.python.org/archives/list/security-announce@python.org/thread/HTWB2Z6KT5QQX4RYEZAFININDHNOSIF3/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6100.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mouoWVvs12H8FynnB5qIsQ==&#34;: {&#xA;      &#34;id&#34;: &#34;mouoWVvs12H8FynnB5qIsQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-14250&#34;,&#xA;      &#34;description&#34;: &#34;This issue resides on libiberty code, a part of binutils, distributed with different versions of RH software. The vulnerability is triggered when the shstrndx (Section Header String Table Index) is zero in the ELF file. This specific condition leads to the integer overflow and subsequent buffer overflow.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-14250 https://bugzilla.redhat.com/show_bug.cgi?id=1739490 https://www.cve.org/CVERecord?id=CVE-2019-14250 https://nvd.nist.gov/vuln/detail/CVE-2019-14250 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-14250.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;n83jaRl/T6kiaoMyWtX8xw==&#34;: {&#xA;      &#34;id&#34;: &#34;n83jaRl/T6kiaoMyWtX8xw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-24032&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in zstd. While the final file mode is reflective of the input file, when compressing or uncompressing, the file can temporarily gain greater permissions than the input and potentially leading to security issues (especially if large files are being handled).&#34;,&#xA;      &#34;issued&#34;: &#34;2021-02-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-24032 https://bugzilla.redhat.com/show_bug.cgi?id=1928090 https://www.cve.org/CVERecord?id=CVE-2021-24032 https://nvd.nist.gov/vuln/detail/CVE-2021-24032 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-24032.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zstd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nYtstWEUOCTbjAlmYOKURA==&#34;: {&#xA;      &#34;id&#34;: &#34;nYtstWEUOCTbjAlmYOKURA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4516&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in CPython&#39;s bytes.decode() function when used with the \&#34;unicode_escape\&#34; encoding and the \&#34;ignore\&#34; or \&#34;replace\&#34; error handling modes. This flaw can result in the incorrect decoding of byte strings. While this may not directly lead to traditional security breaches like data exfiltration, the resulting unexpected program behavior could introduce instability, logic errors, or unintended side effects within applications that rely on this specific decoding functionality.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-15T13:29:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4516 https://bugzilla.redhat.com/show_bug.cgi?id=2366509 https://www.cve.org/CVERecord?id=CVE-2025-4516 https://nvd.nist.gov/vuln/detail/CVE-2025-4516 https://github.com/python/cpython/commit/69b4387f78f413e8c47572a85b3478c47eba8142 https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e https://github.com/python/cpython/issues/133767 https://github.com/python/cpython/pull/129648 https://mail.python.org/archives/list/security-announce@python.org/thread/L75IPBBTSCYEF56I2M4KIW353BB3AY74/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4516.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ngbKDtxhn33NKWC2lhOQNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ngbKDtxhn33NKWC2lhOQNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1485&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Glib&#39;s content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1485 https://bugzilla.redhat.com/show_bug.cgi?id=2433325 https://www.cve.org/CVERecord?id=CVE-2026-1485 https://nvd.nist.gov/vuln/detail/CVE-2026-1485 https://gitlab.gnome.org/GNOME/glib/-/issues/3871 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1485.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;npBrFSWnZYxq9cizdfDfCQ==&#34;: {&#xA;      &#34;id&#34;: &#34;npBrFSWnZYxq9cizdfDfCQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1489&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1489 https://bugzilla.redhat.com/show_bug.cgi?id=2433348 https://www.cve.org/CVERecord?id=CVE-2026-1489 https://nvd.nist.gov/vuln/detail/CVE-2026-1489 https://gitlab.gnome.org/GNOME/glib/-/issues/3872 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1489.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;npQpPXYG8xMJ1LRSVSnKGA==&#34;: {&#xA;      &#34;id&#34;: &#34;npQpPXYG8xMJ1LRSVSnKGA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8114&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libssh, a library that implements the SSH protocol. When calculating the session ID during the key exchange (KEX) process, an allocation failure in cryptographic functions may lead to a NULL pointer dereference. This issue can cause the client or server to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8114 https://bugzilla.redhat.com/show_bug.cgi?id=2383220 https://www.cve.org/CVERecord?id=CVE-2025-8114 https://nvd.nist.gov/vuln/detail/CVE-2025-8114 https://git.libssh.org/projects/libssh.git/commit/?id=53ac23ded4cb2c5463f6c4cd1525331bd578812d https://git.libssh.org/projects/libssh.git/commit/?id=65f363c9 https://www.libssh.org/security/advisories/CVE-2025-8114.txt https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8114.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;p2qAiuM4AsdQ5J4fBWvbBA==&#34;: {&#xA;      &#34;id&#34;: &#34;p2qAiuM4AsdQ5J4fBWvbBA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14512&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib&#39;s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14512 https://bugzilla.redhat.com/show_bug.cgi?id=2421339 https://www.cve.org/CVERecord?id=CVE-2025-14512 https://nvd.nist.gov/vuln/detail/CVE-2025-14512 https://gitlab.gnome.org/GNOME/glib/-/issues/3845 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14512.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pjb5LKdJAfqIzj4N6YBwUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pjb5LKdJAfqIzj4N6YBwUQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-11053&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. A logic error when processing credentials from the .netrc file while performing redirects allows the transfer of credentials from the original host to the followed-to host under certain circumstances, leaking the credentials to the followed-to host.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-12-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-11053 https://bugzilla.redhat.com/show_bug.cgi?id=2331191 https://www.cve.org/CVERecord?id=CVE-2024-11053 https://nvd.nist.gov/vuln/detail/CVE-2024-11053 https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-11053.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qC/lM94bJkHuTCcx6Z47mQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qC/lM94bJkHuTCcx6Z47mQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32778&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat. This vulnerability allows an attacker to trigger a NULL pointer dereference in the `setContext` function. This occurs when the system attempts to retry an operation after an out-of-memory condition, which can lead to a Denial of Service (DoS) for the affected application.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-16T07:02:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32778 https://bugzilla.redhat.com/show_bug.cgi?id=2447885 https://www.cve.org/CVERecord?id=CVE-2026-32778 https://nvd.nist.gov/vuln/detail/CVE-2026-32778 https://github.com/libexpat/libexpat/pull/1159 https://github.com/libexpat/libexpat/pull/1163 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32778.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qXNASosSuCsudML1MqXPjw==&#34;: {&#xA;      &#34;id&#34;: &#34;qXNASosSuCsudML1MqXPjw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27534&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27534 https://bugzilla.redhat.com/show_bug.cgi?id=2179069 https://www.cve.org/CVERecord?id=CVE-2023-27534 https://nvd.nist.gov/vuln/detail/CVE-2023-27534 https://curl.se/docs/CVE-2023-27534.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27534.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qv1CBAIhzNsoWe8hSWlF1g==&#34;: {&#xA;      &#34;id&#34;: &#34;qv1CBAIhzNsoWe8hSWlF1g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28390&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker could exploit this vulnerability by sending a specially crafted Cryptographic Message Syntax (CMS) EnvelopedData message. During the processing of a KeyTransportRecipientInfo with RSA-OAEP encryption, the system attempts to access an optional parameter field without first verifying its presence. This leads to a NULL pointer dereference, which can cause applications processing the attacker-controlled CMS data to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T22:00:54Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28390 https://bugzilla.redhat.com/show_bug.cgi?id=2456314 https://www.cve.org/CVERecord?id=CVE-2026-28390 https://nvd.nist.gov/vuln/detail/CVE-2026-28390 https://github.com/openssl/openssl/commit/01194a8f1941115cd0383bfa91c736dd3993c8bc https://github.com/openssl/openssl/commit/2e39b7a6993be445fddb9fbce316fa756e0397b6 https://github.com/openssl/openssl/commit/af2a5fecd3e71a29e7568f9c1453dec5cebbaff4 https://github.com/openssl/openssl/commit/ea7b4ea4f9f853521ba34830cbcadc970d2e0788 https://github.com/openssl/openssl/commit/fd2f1a6cf53b9ceeca723a001aa4b825d7c7ee75 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28390.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rCI1GSL47zJlliQotxXM4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;rCI1GSL47zJlliQotxXM4Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2673&#34;,&#xA;      &#34;description&#34;: &#34;A key group selection preference flaw has been discovered in OpenSSL. An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the \&#34;DEFAULT\&#34; keyword. A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client&#39;s initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-13T13:23:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2673 https://bugzilla.redhat.com/show_bug.cgi?id=2447327 https://www.cve.org/CVERecord?id=CVE-2026-2673 https://nvd.nist.gov/vuln/detail/CVE-2026-2673 https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34 https://openssl-library.org/news/secadv/20260313.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2673.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rEd6JdG2xx5NZ9bcsFRNpw==&#34;: {&#xA;      &#34;id&#34;: &#34;rEd6JdG2xx5NZ9bcsFRNpw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28388&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a malformed delta Certificate Revocation List (CRL) that lacks a required CRL Number extension, a NULL pointer dereference can occur. This vulnerability can be exploited by a remote attacker who provides a specially crafted delta CRL to an application that has delta CRL processing enabled, leading to a Denial of Service (DoS) for the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28388 https://bugzilla.redhat.com/show_bug.cgi?id=2451097 https://www.cve.org/CVERecord?id=CVE-2026-28388 https://nvd.nist.gov/vuln/detail/CVE-2026-28388 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28388.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rEg00U8+//igCt+0+QBUhA==&#34;: {&#xA;      &#34;id&#34;: &#34;rEg00U8+//igCt+0+QBUhA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-50495&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the NCurses package, where a segmentation fault may be triggered through _nc_wrap_entry().&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-50495 https://bugzilla.redhat.com/show_bug.cgi?id=2254244 https://www.cve.org/CVERecord?id=CVE-2023-50495 https://nvd.nist.gov/vuln/detail/CVE-2023-50495 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-50495.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rVgBV65FWtFg3jitEqotFA==&#34;: {&#xA;      &#34;id&#34;: &#34;rVgBV65FWtFg3jitEqotFA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0727&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. The optional ContentInfo fields can be set to null, even if the \&#34;type\&#34; is a valid value, which can lead to a null dereference error that may cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0727 https://bugzilla.redhat.com/show_bug.cgi?id=2259944 https://www.cve.org/CVERecord?id=CVE-2024-0727 https://nvd.nist.gov/vuln/detail/CVE-2024-0727 https://github.com/openssl/openssl/pull/23362 https://www.openssl.org/news/secadv/20240125.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0727.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rfyVleP0iFAaKAccoWyLNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rfyVleP0iFAaKAccoWyLNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3805&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When handling a second Server Message Block (SMB) request to the same host, curl incorrectly accesses memory that has already been freed. This memory corruption vulnerability, known as a use-after-free, could allow a remote attacker to potentially execute arbitrary code or cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:09:37Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3805 https://bugzilla.redhat.com/show_bug.cgi?id=2446451 https://www.cve.org/CVERecord?id=CVE-2026-3805 https://nvd.nist.gov/vuln/detail/CVE-2026-3805 http://www.openwall.com/lists/oss-security/2026/03/11/4 https://curl.se/docs/CVE-2026-3805.html https://curl.se/docs/CVE-2026-3805.json https://hackerone.com/reports/3591944 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3805.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ruDQdx7OmIsgMCpioWbqOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ruDQdx7OmIsgMCpioWbqOQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5351&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys into serialized formats. During error handling, a memory structure is freed but not cleared, leading to a potential double free issue if an additional failure occurs later in the function. This condition may result in heap corruption or application instability in low-memory scenarios, posing a risk to system reliability where key export operations are performed.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5351 https://bugzilla.redhat.com/show_bug.cgi?id=2369367 https://www.cve.org/CVERecord?id=CVE-2025-5351 https://nvd.nist.gov/vuln/detail/CVE-2025-5351 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5351.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;s1kzjy+cDztHEcgHrl7kHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;s1kzjy+cDztHEcgHrl7kHQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22801&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a reference library for PNG (Portable Network Graphics) raster image files. An integer truncation vulnerability exists in the png_write_image_16bit and png_write_image_8bit simplified write API functions. A local attacker could exploit this flaw by providing a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes, leading to a heap buffer over-read. This can result in information disclosure or a denial of service (DoS) to the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T22:57:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22801 https://bugzilla.redhat.com/show_bug.cgi?id=2428824 https://www.cve.org/CVERecord?id=CVE-2026-22801 https://nvd.nist.gov/vuln/detail/CVE-2026-22801 https://github.com/pnggroup/libpng/security/advisories/GHSA-vgjq-8cw5-ggw8 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22801.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sExC9WXn4M01POjg0haQrA==&#34;: {&#xA;      &#34;id&#34;: &#34;sExC9WXn4M01POjg0haQrA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34933&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Avahi. An unprivileged local user can exploit this vulnerability by sending a D-Bus method call with conflicting publish flags. This can lead to a denial of service (DoS) by crashing the avahi-daemon, making the service unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-03T22:43:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34933 https://bugzilla.redhat.com/show_bug.cgi?id=2454978 https://www.cve.org/CVERecord?id=CVE-2026-34933 https://nvd.nist.gov/vuln/detail/CVE-2026-34933 https://github.com/avahi/avahi/commit/625ca0fac19229f6dfa3a6c6b698ae657187e50c https://github.com/avahi/avahi/pull/891 https://github.com/avahi/avahi/security/advisories/GHSA-w65r-6gxh-vhvc https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34933.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sGwL9v57mGx7f18qBkIacA==&#34;: {&#xA;      &#34;id&#34;: &#34;sGwL9v57mGx7f18qBkIacA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6075&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in Python’s os.path.expandvars() function that can cause performance degradation. When processing specially crafted, user-controlled input with nested environment variable patterns, the function exhibits quadratic time complexity, potentially leading to excessive CPU usage and denial of service (DoS) conditions. No code execution or data exposure occurs, so the impact is limited to performance slowdown.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-31T16:41:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6075 https://bugzilla.redhat.com/show_bug.cgi?id=2408891 https://www.cve.org/CVERecord?id=CVE-2025-6075 https://nvd.nist.gov/vuln/detail/CVE-2025-6075 https://github.com/python/cpython/issues/136065 https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6075.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sRVcQFAdq4Ll42smqacaCw==&#34;: {&#xA;      &#34;id&#34;: &#34;sRVcQFAdq4Ll42smqacaCw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-27943&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils, where GNU GCC is vulnerable to a denial of service caused by a stack consumption in the demangle_const() function in libiberty/rust-demangle.c. The vulnerability exists due to the application not properly controlling the consumption of internal resources. By persuading a victim to open a specially-crafted file, an attacker could cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-27943 https://bugzilla.redhat.com/show_bug.cgi?id=2071728 https://www.cve.org/CVERecord?id=CVE-2022-27943 https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-27943.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sThg2GGoKqa1RTJ5skEJTA==&#34;: {&#xA;      &#34;id&#34;: &#34;sThg2GGoKqa1RTJ5skEJTA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-24883&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. A remote attacker could provide a specially crafted long signature packet that, when processed, causes the application to crash. This vulnerability leads to a denial of service (DoS), making the GnuPG application unavailable to legitimate users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T18:43:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-24883 https://bugzilla.redhat.com/show_bug.cgi?id=2433463 https://www.cve.org/CVERecord?id=CVE-2026-24883 https://nvd.nist.gov/vuln/detail/CVE-2026-24883 https://dev.gnupg.org/T8049 https://www.openwall.com/lists/oss-security/2026/01/27/8 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-24883.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;t3XJyztcU9aOXTMLI8NRmA==&#34;: {&#xA;      &#34;id&#34;: &#34;t3XJyztcU9aOXTMLI8NRmA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-23T21:03:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-29111 https://bugzilla.redhat.com/show_bug.cgi?id=2450505 https://www.cve.org/CVERecord?id=CVE-2026-29111 https://nvd.nist.gov/vuln/detail/CVE-2026-29111 https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6 https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412 https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69 https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6 https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8 https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-29111.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;t4oe6DBPNf5Ikk93RfTdig==&#34;: {&#xA;      &#34;id&#34;: &#34;t4oe6DBPNf5Ikk93RfTdig==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-12904&#34;,&#xA;      &#34;description&#34;: &#34;[Disputed] A vulnerability has been identified in Libgcrypt due to a flaw in its C implementation of AES. This vulnerability enables a remote attacker to perform a flush-and-reload side-channel attack, potentially accessing sensitive information. The vulnerability arises from the availability of physical addresses to other processes, particularly on platforms lacking an assembly-language implementation.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-07-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-12904 https://bugzilla.redhat.com/show_bug.cgi?id=1730320 https://www.cve.org/CVERecord?id=CVE-2019-12904 https://nvd.nist.gov/vuln/detail/CVE-2019-12904 https://dev.gnupg.org/T4541 https://lists.gnupg.org/pipermail/gcrypt-devel/2019-July/004760.html https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12904.html https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-12904.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tYeLT/YUKIk7yaK07WvPeA==&#34;: {&#xA;      &#34;id&#34;: &#34;tYeLT/YUKIk7yaK07WvPeA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32776&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat. A remote attacker could exploit this vulnerability by providing specially crafted XML content with empty external parameter entities. This could lead to a NULL pointer dereference, causing the application to crash and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-16T06:54:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32776 https://bugzilla.redhat.com/show_bug.cgi?id=2447888 https://www.cve.org/CVERecord?id=CVE-2026-32776 https://nvd.nist.gov/vuln/detail/CVE-2026-32776 https://github.com/libexpat/libexpat/pull/1158 https://github.com/libexpat/libexpat/pull/1159 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32776.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;teoauN/Djw6odXikmjP4Lw==&#34;: {&#xA;      &#34;id&#34;: &#34;teoauN/Djw6odXikmjP4Lw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68471&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Avahi, a system that enables devices to discover services on a local network using the mDNS/DNS-SD (Multicast Domain Name System/DNS-based Service Discovery) protocols. A remote attacker can exploit this by sending two specific network messages, known as unsolicited announcements with CNAME resource records, within a two-second timeframe. This action can cause the `avahi-daemon` process to crash, leading to a Denial of Service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T17:39:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68471 https://bugzilla.redhat.com/show_bug.cgi?id=2428717 https://www.cve.org/CVERecord?id=CVE-2025-68471 https://nvd.nist.gov/vuln/detail/CVE-2025-68471 https://github.com/avahi/avahi/commit/9c6eb53bf2e290aed84b1f207e3ce35c54cc0aa1 https://github.com/avahi/avahi/issues/678 https://github.com/avahi/avahi/security/advisories/GHSA-56rf-42xr-qmmg https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68471.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tlWVK61iOpKPkvmeShS9AQ==&#34;: {&#xA;      &#34;id&#34;: &#34;tlWVK61iOpKPkvmeShS9AQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tnBbKyfWYMq7GMqd8UCfIw==&#34;: {&#xA;      &#34;id&#34;: &#34;tnBbKyfWYMq7GMqd8UCfIw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-70873&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in SQLite. This information disclosure vulnerability exists within the zipfile extension, specifically in the zipfileInflate function. A remote attacker could exploit this by providing a specially crafted ZIP file. Successful exploitation could lead to the disclosure of sensitive heap memory information.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-70873 https://bugzilla.redhat.com/show_bug.cgi?id=2447086 https://www.cve.org/CVERecord?id=CVE-2025-70873 https://nvd.nist.gov/vuln/detail/CVE-2025-70873 https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054 https://sqlite.org/forum/forumpost/761eac3c82 https://sqlite.org/src/info/3d459f1fb1bd1b5e https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-70873.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u7b5r2PfK9a1QyjBR1cFRw==&#34;: {&#xA;      &#34;id&#34;: &#34;u7b5r2PfK9a1QyjBR1cFRw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4046&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. A remote attacker could exploit this vulnerability by providing specially crafted inputs using the IBM1390 or IBM1399 character sets to the `iconv()` function. This could lead to an assertion failure, causing the application to crash and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T17:16:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4046 https://bugzilla.redhat.com/show_bug.cgi?id=2453117 https://www.cve.org/CVERecord?id=CVE-2026-4046 https://nvd.nist.gov/vuln/detail/CVE-2026-4046 https://packages.fedoraproject.org/pkgs/glibc/glibc-gconv-extra/ https://sourceware.org/bugzilla/show_bug.cgi?id=33980 https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4046.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uEggs7thHCRp4eZu5EDH0A==&#34;: {&#xA;      &#34;id&#34;: &#34;uEggs7thHCRp4eZu5EDH0A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27171&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in zlib. An attacker providing specially crafted input to the `crc32_combine64` or `crc32_combine_gen64` functions could trigger an infinite loop within the `x2nmodp` function. This leads to excessive CPU consumption, which can result in a Denial of Service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-18T02:36:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27171 https://bugzilla.redhat.com/show_bug.cgi?id=2440530 https://www.cve.org/CVERecord?id=CVE-2026-27171 https://nvd.nist.gov/vuln/detail/CVE-2026-27171 https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/ https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf https://github.com/madler/zlib/issues/904 https://github.com/madler/zlib/releases/tag/v1.3.2 https://ostif.org/zlib-audit-complete/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27171.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uWVbYb9OwW4BBqLbnE2d4A==&#34;: {&#xA;      &#34;id&#34;: &#34;uWVbYb9OwW4BBqLbnE2d4A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-23865&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Freetype. An integer overflow vulnerability exists when processing specially crafted OpenType variable fonts. A local attacker could exploit this by convincing a user to open a malicious font file, which may lead to an out-of-bounds read and potential information disclosure or denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-02T16:09:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-23865 https://bugzilla.redhat.com/show_bug.cgi?id=2443891 https://www.cve.org/CVERecord?id=CVE-2026-23865 https://nvd.nist.gov/vuln/detail/CVE-2026-23865 https://gitlab.com/freetype/freetype/-/commit/fc85a255849229c024c8e65f536fe1875d84841c https://sourceforge.net/projects/freetype/files/freetype2/2.14.2/ https://www.facebook.com/security/advisories/cve-2026-23865 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-23865.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uxd8tIEkk+r2hWTEgvyv8w==&#34;: {&#xA;      &#34;id&#34;: &#34;uxd8tIEkk+r2hWTEgvyv8w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-9936&#34;,&#xA;      &#34;description&#34;: &#34;In SQLite 3.27.2, running fts5 prefix queries inside a transaction could trigger a heap-based buffer over-read in fts5HashEntrySort in sqlite3.c, which may lead to an information leak. This is related to ext/fts5/fts5_hash.c.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-03-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-9936 https://bugzilla.redhat.com/show_bug.cgi?id=1692365 https://www.cve.org/CVERecord?id=CVE-2019-9936 https://nvd.nist.gov/vuln/detail/CVE-2019-9936 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-9936.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;v1exQXePimNPt3tveLBP9g==&#34;: {&#xA;      &#34;id&#34;: &#34;v1exQXePimNPt3tveLBP9g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1965&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an application uses libcurl to make multiple Negotiate-authenticated HTTP or HTTPS requests to the same server with different credentials, libcurl may incorrectly reuse an existing connection. This logical error can cause a subsequent request to be sent using the authentication of a previous user, leading to an authentication bypass.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:08:52Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1965 https://bugzilla.redhat.com/show_bug.cgi?id=2446448 https://www.cve.org/CVERecord?id=CVE-2026-1965 https://nvd.nist.gov/vuln/detail/CVE-2026-1965 https://curl.se/docs/CVE-2026-1965.html https://curl.se/docs/CVE-2026-1965.json https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1965.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vTJZ/R8pdcyDbwAwRi8cBw==&#34;: {&#xA;      &#34;id&#34;: &#34;vTJZ/R8pdcyDbwAwRi8cBw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15079&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When performing SSH-based transfers using SCP or SFTP, libcurl could mistakenly connect to hosts not listed in the user-specified knownhosts file. This occurs if the host is present in the libssh global knownhosts file, effectively bypassing the intended host verification. This could allow a remote attacker to connect to an untrusted host, potentially leading to information disclosure or man-in-the-middle attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15079 https://bugzilla.redhat.com/show_bug.cgi?id=2426409 https://www.cve.org/CVERecord?id=CVE-2025-15079 https://nvd.nist.gov/vuln/detail/CVE-2025-15079 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15079.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vx2N2RZTm7neux8kVlqgEg==&#34;: {&#xA;      &#34;id&#34;: &#34;vx2N2RZTm7neux8kVlqgEg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5704&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tar. A remote attacker could exploit this vulnerability by crafting a malicious archive, leading to hidden file injection with fully attacker-controlled content. This bypasses pre-extraction inspection mechanisms, potentially allowing an attacker to introduce malicious files onto a system without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-06T13:36:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5704 https://bugzilla.redhat.com/show_bug.cgi?id=2455360 https://www.cve.org/CVERecord?id=CVE-2026-5704 https://nvd.nist.gov/vuln/detail/CVE-2026-5704 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5704.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wbBiCPikq6Iz02EPsysTgA==&#34;: {&#xA;      &#34;id&#34;: &#34;wbBiCPikq6Iz02EPsysTgA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14017&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When performing multi-threaded LDAPS (Lightweight Directory Access Protocol Secure) transfers, changes to Transport Layer Security (TLS) options in one thread could inadvertently apply globally, affecting other concurrent transfers. This could lead to unintended security posture changes, such as disabling certificate verification for other threads. This vulnerability can result in a security bypass, where expected security checks are not performed.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-08T10:07:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14017 https://bugzilla.redhat.com/show_bug.cgi?id=2427870 https://www.cve.org/CVERecord?id=CVE-2025-14017 https://nvd.nist.gov/vuln/detail/CVE-2025-14017 https://curl.se/docs/CVE-2025-14017.html https://curl.se/docs/CVE-2025-14017.json https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14017.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wxS+u/uf8o4sT9iSccXQwA==&#34;: {&#xA;      &#34;id&#34;: &#34;wxS+u/uf8o4sT9iSccXQwA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4426&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. An Undefined Behavior vulnerability exists in the zisofs decompression logic, caused by improper validation of a field (`pz_log2_bs`) read from ISO9660 Rock Ridge extensions. A remote attacker can exploit this by supplying a specially crafted ISO file. This can lead to incorrect memory allocation and potential application crashes, resulting in a denial-of-service (DoS) condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4426 https://bugzilla.redhat.com/show_bug.cgi?id=2449010 https://www.cve.org/CVERecord?id=CVE-2026-4426 https://nvd.nist.gov/vuln/detail/CVE-2026-4426 https://github.com/libarchive/libarchive/pull/2897 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4426.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xCUiEQAH1lfhrKtUxQDIYA==&#34;: {&#xA;      &#34;id&#34;: &#34;xCUiEQAH1lfhrKtUxQDIYA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-39537&#34;,&#xA;      &#34;description&#34;: &#34;A heap overflow vulnerability has been identified in the ncurses package, particularly in the \&#34;tic\&#34;. This flaw results from a lack of proper bounds checking during input processing. By exploiting this boundary error, an attacker can create a malicious file, deceive the victim into opening it using the affected software, and initiate an out-of-bounds write, potentially impacting system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-08-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-39537 https://bugzilla.redhat.com/show_bug.cgi?id=2006978 https://www.cve.org/CVERecord?id=CVE-2021-39537 https://nvd.nist.gov/vuln/detail/CVE-2021-39537 https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-39537.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xKLQGv5zNwcnWtQQKiO3Ww==&#34;: {&#xA;      &#34;id&#34;: &#34;xKLQGv5zNwcnWtQQKiO3Ww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25645&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the `requests` HTTP library, specifically in the `requests.utils.extract_zipped_paths()` function, which is used to load Certificate Authority (CA) bundles. A local attacker can exploit this vulnerability by pre-creating a malicious CA bundle file in the system&#39;s temporary directory. When a vulnerable application initializes the `requests` library, it may load this malicious file instead of the legitimate CA bundle, leading to a bypass of security controls and potential integrity compromise.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-25T17:02:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25645 https://bugzilla.redhat.com/show_bug.cgi?id=2451408 https://www.cve.org/CVERecord?id=CVE-2026-25645 https://nvd.nist.gov/vuln/detail/CVE-2026-25645 https://github.com/psf/requests/commit/66d21cb07bd6255b1280291c4fafb71803cdb3b7 https://github.com/psf/requests/releases/tag/v2.33.0 https://github.com/psf/requests/security/advisories/GHSA-gc5v-m9x4-r6x2 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25645.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xLIujTim86EomaRofe4tDg==&#34;: {&#xA;      &#34;id&#34;: &#34;xLIujTim86EomaRofe4tDg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32611&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32611 https://bugzilla.redhat.com/show_bug.cgi?id=2211829 https://www.cve.org/CVERecord?id=CVE-2023-32611 https://nvd.nist.gov/vuln/detail/CVE-2023-32611 https://gitlab.gnome.org/GNOME/glib/-/issues/2797 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32611.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xYjfT47p5BaLoMKfWyn2HQ==&#34;: {&#xA;      &#34;id&#34;: &#34;xYjfT47p5BaLoMKfWyn2HQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-24515&#34;,&#xA;      &#34;description&#34;: &#34;In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-23T07:46:36Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-24515 https://bugzilla.redhat.com/show_bug.cgi?id=2432312 https://www.cve.org/CVERecord?id=CVE-2026-24515 https://nvd.nist.gov/vuln/detail/CVE-2026-24515 https://github.com/libexpat/libexpat/pull/1131 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-24515.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xjRJnKlNaH/FGi0NN5VKBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;xjRJnKlNaH/FGi0NN5VKBQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0992&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated \u003cnextCatalog\u003e elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0992 https://bugzilla.redhat.com/show_bug.cgi?id=2429975 https://www.cve.org/CVERecord?id=CVE-2026-0992 https://nvd.nist.gov/vuln/detail/CVE-2026-0992 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1019 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0992.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yGCmffaimhyTCMJRNZflXg==&#34;: {&#xA;      &#34;id&#34;: &#34;yGCmffaimhyTCMJRNZflXg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5121&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T07:44:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5121 https://bugzilla.redhat.com/show_bug.cgi?id=2452945 https://www.cve.org/CVERecord?id=CVE-2026-5121 https://nvd.nist.gov/vuln/detail/CVE-2026-5121 https://github.com/advisories/GHSA-2vwv-vqpv-v8vc https://github.com/libarchive/libarchive/pull/2934 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5121.json https://access.redhat.com/errata/RHSA-2026:8534&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.3.3-7.el8_10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yePhQ2wYSrZV2+z+gEbpRg==&#34;: {&#xA;      &#34;id&#34;: &#34;yePhQ2wYSrZV2+z+gEbpRg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9714&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxstl/libxml2. The &#39;exsltDynMapFunction&#39; function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling &#39;dyn:map()&#39;, leading to stack exhaustion and a local denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yuFlxOGqQlDuMCywIIELNw==&#34;: {&#xA;      &#34;id&#34;: &#34;yuFlxOGqQlDuMCywIIELNw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-30258&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. In affected versions, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, leading to a verification denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-30258 https://bugzilla.redhat.com/show_bug.cgi?id=2353427 https://www.cve.org/CVERecord?id=CVE-2025-30258 https://nvd.nist.gov/vuln/detail/CVE-2025-30258 https://dev.gnupg.org/T7527 https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-30258.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zMNYUY09QO2aCVD23XG4dw==&#34;: {&#xA;      &#34;id&#34;: &#34;zMNYUY09QO2aCVD23XG4dw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8277&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libssh&#39;s handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8277 https://bugzilla.redhat.com/show_bug.cgi?id=2383888 https://www.cve.org/CVERecord?id=CVE-2025-8277 https://nvd.nist.gov/vuln/detail/CVE-2025-8277 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8277.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;package_vulnerabilities&#34;: {&#xA;    &#34;+hvIC0Et/RtHi7EAFCmfEw==&#34;: [&#xA;      &#34;O6eQrDqYe8zCvECWFMIzFQ==&#34;,&#xA;      &#34;MRnBR1NwPejsF0F/Po53Ew==&#34;&#xA;    ],&#xA;    &#34;+qrxjVH7Im8eBfrz4h4P/w==&#34;: [&#xA;      &#34;Zp9+pixFuNBueE2yO610gQ==&#34;&#xA;    ],&#xA;    &#34;/ji9IJ9FfNcwqVRbMWZshQ==&#34;: [&#xA;      &#34;+nHq7dak7Hkjcru/xpwzhQ==&#34;,&#xA;      &#34;L7QbkTbsy8v3tMfOqNsVKQ==&#34;&#xA;    ],&#xA;    &#34;0+9x6aIRcNDCM7R94cpzew==&#34;: [&#xA;      &#34;8TgjbHNGzIFm7/fF9DBU7Q==&#34;,&#xA;      &#34;1vG4ZYIu07BTj9XJ+a+P9Q==&#34;,&#xA;      &#34;B5eXEM8SeidgdpzXoFJFGQ==&#34;,&#xA;      &#34;m8ueKfgkaYIYTU+xtIQcwA==&#34;,&#xA;      &#34;Te9j1HGn7feNCE/Fduu0+A==&#34;,&#xA;      &#34;YoCxZvEp16Bt9LDv+Ficeg==&#34;,&#xA;      &#34;I31WPu2ZGWOsqloSJfE2Fg==&#34;,&#xA;      &#34;uWVbYb9OwW4BBqLbnE2d4A==&#34;,&#xA;      &#34;cW+DgNrGAeRAwNB4wrDZhw==&#34;,&#xA;      &#34;VPoF+qCqaQ4y2sVl2255/g==&#34;,&#xA;      &#34;s1kzjy+cDztHEcgHrl7kHQ==&#34;,&#xA;      &#34;OTZM0RD60ajdSeEqWGkkTw==&#34;,&#xA;      &#34;29qrZyz+fmdn9Nzjpl2/Pg==&#34;,&#xA;      &#34;6p6EeZQEuYkK2CtO4ey3Ag==&#34;,&#xA;      &#34;FkRDB0vpJYeh2ipqLS0/Iw==&#34;&#xA;    ],&#xA;    &#34;2PBlaOceApWEi634ZUHO/g==&#34;: [&#xA;      &#34;mRazAXjBcgFrTolNDZHDsA==&#34;,&#xA;      &#34;h6rS2s3xilGaG0a+pIjl8A==&#34;,&#xA;      &#34;mVT54HSCxoOy6IF9Noa/Zw==&#34;,&#xA;      &#34;sGwL9v57mGx7f18qBkIacA==&#34;,&#xA;      &#34;6Xr5PbPGSy+aHLDQ9q4L9w==&#34;,&#xA;      &#34;RVCidRUm4D1IKoPhoUi2AA==&#34;,&#xA;      &#34;L3k0cIIlkMGQFiWnZm8Mlg==&#34;,&#xA;      &#34;XXiaw1EwhFkuilI94EKiqQ==&#34;,&#xA;      &#34;X37PWFfcTFBuBxL2613UQg==&#34;,&#xA;      &#34;0QzoXQSqkKieJ7Oc+px0JA==&#34;,&#xA;      &#34;8qOJVWAut1+UqTXPOWH12g==&#34;,&#xA;      &#34;HB9r/GLycEmk6aXttwtBlw==&#34;,&#xA;      &#34;2U8ppg+02PjFDuM5YqFstQ==&#34;,&#xA;      &#34;HKrLnQyTw1292mNt3MQ0aQ==&#34;,&#xA;      &#34;ZlxfTVb/4bi6yWQ+JLaOnw==&#34;,&#xA;      &#34;nYtstWEUOCTbjAlmYOKURA==&#34;,&#xA;      &#34;5ZHvcDYhgzWjwNpRgF2u1w==&#34;,&#xA;      &#34;IItHEdPWz5fl9O7ZhzjDAA==&#34;,&#xA;      &#34;OFdQC3/0S5rItoyqpACTFw==&#34;,&#xA;      &#34;8rvqTFlh9aOz4UvxQN0SBQ==&#34;,&#xA;      &#34;cCowLuOsLfTMmPFOoqUVww==&#34;&#xA;    ],&#xA;    &#34;4flTdmUV4iK1Ax+LXJm8qQ==&#34;: [&#xA;      &#34;fvGjL9hw9hDQockMTb7lrA==&#34;&#xA;    ],&#xA;    &#34;4uQuJg+li+gGAwnGRDcs+w==&#34;: [&#xA;      &#34;+nHq7dak7Hkjcru/xpwzhQ==&#34;,&#xA;      &#34;L7QbkTbsy8v3tMfOqNsVKQ==&#34;&#xA;    ],&#xA;    &#34;7eg89eCgA75bJ7WhhN/T4Q==&#34;: [&#xA;      &#34;eqoqeJN8gMUINJLH2PXP7g==&#34;,&#xA;      &#34;hkP7fdNBNcMv5alTtw0c+Q==&#34;&#xA;    ],&#xA;    &#34;9uhqFNTCJ7/bpzSlc7qCaQ==&#34;: [&#xA;      &#34;t4oe6DBPNf5Ikk93RfTdig==&#34;,&#xA;      &#34;fXpWtuXNPi3tb2edhk37bw==&#34;&#xA;    ],&#xA;    &#34;AIs6pmCup5N9+6Ag6e2/og==&#34;: [&#xA;      &#34;qv1CBAIhzNsoWe8hSWlF1g==&#34;,&#xA;      &#34;UPzTyNn8ZLXlb+bwRFPPTA==&#34;,&#xA;      &#34;WcChSpNAL6V9Xfxc9AqW7g==&#34;,&#xA;      &#34;ZkEez7f24VNVhTaTCDhuEg==&#34;,&#xA;      &#34;6FQUI3OxX4C5skWXKgq80Q==&#34;,&#xA;      &#34;OpUahpCA4oBceG962KxTMA==&#34;,&#xA;      &#34;QcOTYeOedG0AUhPSakMpIA==&#34;,&#xA;      &#34;rEd6JdG2xx5NZ9bcsFRNpw==&#34;,&#xA;      &#34;PcNbuWOo0ahqjfbOQhXvvQ==&#34;,&#xA;      &#34;gagftKXuSuh9pi4dRu9yPQ==&#34;,&#xA;      &#34;8D3i4K1ylUr5dGk9imV9zA==&#34;,&#xA;      &#34;97PwDrD8knMveLXwKCvQjA==&#34;,&#xA;      &#34;tlWVK61iOpKPkvmeShS9AQ==&#34;,&#xA;      &#34;86unVXyTxdffdcXWZTYw5g==&#34;,&#xA;      &#34;BV++s35Ur4bQRS6HK0QCIA==&#34;,&#xA;      &#34;OLKvdPVgT9/lPcflJTxE3Q==&#34;,&#xA;      &#34;UgHucRu0hN47CoyxGAMXTQ==&#34;,&#xA;      &#34;rCI1GSL47zJlliQotxXM4Q==&#34;,&#xA;      &#34;Fp999hDC/lucBsNHwOlp/A==&#34;,&#xA;      &#34;VLzwKVDYC7fQrtcpCzjXjA==&#34;,&#xA;      &#34;QUtTYJuHdkAOgtveagWUfA==&#34;,&#xA;      &#34;LWLSX4FCLbzYWK97i5Or+A==&#34;,&#xA;      &#34;rVgBV65FWtFg3jitEqotFA==&#34;&#xA;    ],&#xA;    &#34;AuC6XQzcU/5tB4luIfjLFg==&#34;: [&#xA;      &#34;HTk+AAyRWNCrZTtBLx34Aw==&#34;&#xA;    ],&#xA;    &#34;AziZ1oGI+oDXVPzldKNj+w==&#34;: [&#xA;      &#34;3O4IzHXnRQMZXCe1gYATvw==&#34;&#xA;    ],&#xA;    &#34;BPsD0kkdIoK3KQUZ5DpJjw==&#34;: [&#xA;      &#34;ZvX4VR3jvMBd1Wq+RxNTgg==&#34;&#xA;    ],&#xA;    &#34;DV119Dw0W4RdsbJkdoHU9w==&#34;: [&#xA;      &#34;qXNASosSuCsudML1MqXPjw==&#34;,&#xA;      &#34;rfyVleP0iFAaKAccoWyLNQ==&#34;,&#xA;      &#34;8KJb4x3mXgChaQULEsid2A==&#34;,&#xA;      &#34;Znm2hdK/FULQhTTGTVX59Q==&#34;,&#xA;      &#34;v1exQXePimNPt3tveLBP9g==&#34;,&#xA;      &#34;pjb5LKdJAfqIzj4N6YBwUQ==&#34;,&#xA;      &#34;crmilTSJ/pTSPBKY9EJmZg==&#34;,&#xA;      &#34;fayrPya6DVXP9weWvA6obQ==&#34;,&#xA;      &#34;TuBnhFrkwMqIcYtYYgNGNQ==&#34;,&#xA;      &#34;ho4M6//kfDyE5kZ9fbpV0g==&#34;,&#xA;      &#34;wbBiCPikq6Iz02EPsysTgA==&#34;,&#xA;      &#34;vTJZ/R8pdcyDbwAwRi8cBw==&#34;,&#xA;      &#34;Pe4IHqZpuBtuSkrgd2HMEg==&#34;&#xA;    ],&#xA;    &#34;DgyhtZBcSIlVmY6xC8s1mA==&#34;: [&#xA;      &#34;j1KIfSLRyAo+5FqbDzJbtg==&#34;&#xA;    ],&#xA;    &#34;EGfzPeF6a5hj9x4BwoN25A==&#34;: [&#xA;      &#34;SixpK4TZp5ARiPVlZlGpew==&#34;&#xA;    ],&#xA;    &#34;FS5/DAbDsXWURU9onlACPA==&#34;: [&#xA;      &#34;Q5xJp4zJ1MCYcYbDi9qrdQ==&#34;&#xA;    ],&#xA;    &#34;J34PJ2GThOWZuKVgFIoieA==&#34;: [&#xA;      &#34;uEggs7thHCRp4eZu5EDH0A==&#34;&#xA;    ],&#xA;    &#34;LXiVkIlXLq/usMYIwCTH8Q==&#34;: [&#xA;      &#34;WGvgNwrW2u5APZcidQ6v1Q==&#34;&#xA;    ],&#xA;    &#34;LkoLKEri5dIAb0vFMkSOag==&#34;: [&#xA;      &#34;6Cqvzp5JbuVfHsuYnIJNFw==&#34;,&#xA;      &#34;u7b5r2PfK9a1QyjBR1cFRw==&#34;,&#xA;      &#34;cqYWiTibDLM7aibErMKang==&#34;&#xA;    ],&#xA;    &#34;N1RbIRo2SyHosQefv+skDw==&#34;: [&#xA;      &#34;UbmdE2pHXRFccv8l1e02Jw==&#34;&#xA;    ],&#xA;    &#34;N3ZaMrNJKoumMpaY0smlMQ==&#34;: [&#xA;      &#34;8ZxbhBIT+9Mj99/XbMpLSQ==&#34;,&#xA;      &#34;9zRC9UwUH2bQs1UcHQ5UTQ==&#34;,&#xA;      &#34;uxd8tIEkk+r2hWTEgvyv8w==&#34;,&#xA;      &#34;5B1tQ2BK8z/YjRkYcvwqag==&#34;,&#xA;      &#34;tnBbKyfWYMq7GMqd8UCfIw==&#34;&#xA;    ],&#xA;    &#34;NguWV8S6YQYvQsGQDJm2Rg==&#34;: [&#xA;      &#34;xCUiEQAH1lfhrKtUxQDIYA==&#34;,&#xA;      &#34;HuOxI+pWjgGV0XsBvltzlg==&#34;,&#xA;      &#34;SHxE0qXbBmDEp/LL1ieJeA==&#34;,&#xA;      &#34;rEg00U8+//igCt+0+QBUhA==&#34;,&#xA;      &#34;jw1ZiDut5Ot+DyVFjCrixg==&#34;,&#xA;      &#34;673FKazcUiydbfN5c6amaw==&#34;,&#xA;      &#34;ZTGiJlkqcqrCLJSY/Sq8lA==&#34;,&#xA;      &#34;VsocCwaFpF6PzdX5PxR+sQ==&#34;,&#xA;      &#34;S7qx7a03HASsJhyQafvXjg==&#34;&#xA;    ],&#xA;    &#34;ORsDK2A5479NPB0r01PoXQ==&#34;: [&#xA;      &#34;qXNASosSuCsudML1MqXPjw==&#34;,&#xA;      &#34;rfyVleP0iFAaKAccoWyLNQ==&#34;,&#xA;      &#34;8KJb4x3mXgChaQULEsid2A==&#34;,&#xA;      &#34;Znm2hdK/FULQhTTGTVX59Q==&#34;,&#xA;      &#34;v1exQXePimNPt3tveLBP9g==&#34;,&#xA;      &#34;pjb5LKdJAfqIzj4N6YBwUQ==&#34;,&#xA;      &#34;crmilTSJ/pTSPBKY9EJmZg==&#34;,&#xA;      &#34;fayrPya6DVXP9weWvA6obQ==&#34;,&#xA;      &#34;TuBnhFrkwMqIcYtYYgNGNQ==&#34;,&#xA;      &#34;ho4M6//kfDyE5kZ9fbpV0g==&#34;,&#xA;      &#34;wbBiCPikq6Iz02EPsysTgA==&#34;,&#xA;      &#34;vTJZ/R8pdcyDbwAwRi8cBw==&#34;,&#xA;      &#34;Pe4IHqZpuBtuSkrgd2HMEg==&#34;&#xA;    ],&#xA;    &#34;POPH5BJ/Q4Bfen05TT291g==&#34;: [&#xA;      &#34;+nHq7dak7Hkjcru/xpwzhQ==&#34;,&#xA;      &#34;L7QbkTbsy8v3tMfOqNsVKQ==&#34;&#xA;    ],&#xA;    &#34;Q0uPb/t/3IQ8GEwlv/J3Cw==&#34;: [&#xA;      &#34;WGvgNwrW2u5APZcidQ6v1Q==&#34;&#xA;    ],&#xA;    &#34;QC6e3OaV78mjs678tGU2KQ==&#34;: [&#xA;      &#34;eohUFw28jV3sGLZE2CBPXA==&#34;,&#xA;      &#34;H9Ud41wofJc/QlL6Rm7WkA==&#34;,&#xA;      &#34;avzu5SRbIjcduH4QdmZ1gg==&#34;,&#xA;      &#34;OgFGrvrnAoXXvapnatTrxQ==&#34;,&#xA;      &#34;XbpXfbeApuDuIKvY0/qWiA==&#34;,&#xA;      &#34;ruDQdx7OmIsgMCpioWbqOQ==&#34;,&#xA;      &#34;zMNYUY09QO2aCVD23XG4dw==&#34;,&#xA;      &#34;npQpPXYG8xMJ1LRSVSnKGA==&#34;,&#xA;      &#34;KCgCqCavM9U0xL+GHJqzSg==&#34;,&#xA;      &#34;Rfm1tD+QxSP/TVjKFDNabg==&#34;&#xA;    ],&#xA;    &#34;U3ZkYu9FoEzQITrVBlQtLA==&#34;: [&#xA;      &#34;6Cqvzp5JbuVfHsuYnIJNFw==&#34;,&#xA;      &#34;u7b5r2PfK9a1QyjBR1cFRw==&#34;,&#xA;      &#34;cqYWiTibDLM7aibErMKang==&#34;&#xA;    ],&#xA;    &#34;UUZyda9G/ffvF6rJ5W1UnQ==&#34;: [&#xA;      &#34;sRVcQFAdq4Ll42smqacaCw==&#34;,&#xA;      &#34;mouoWVvs12H8FynnB5qIsQ==&#34;,&#xA;      &#34;ieASPdYzGxWke8nZZhE02Q==&#34;&#xA;    ],&#xA;    &#34;Vax934M9zGbzjdT3Y/XU9w==&#34;: [&#xA;      &#34;6Cqvzp5JbuVfHsuYnIJNFw==&#34;,&#xA;      &#34;u7b5r2PfK9a1QyjBR1cFRw==&#34;,&#xA;      &#34;cqYWiTibDLM7aibErMKang==&#34;&#xA;    ],&#xA;    &#34;Wq1n4jzKBPdL9z5l5HD99w==&#34;: [&#xA;      &#34;DDWmqlxBSfXi2KJJ5mwTNg==&#34;,&#xA;      &#34;8Sec+JvKiQWGqYCOBdZhjg==&#34;,&#xA;      &#34;wxS+u/uf8o4sT9iSccXQwA==&#34;,&#xA;      &#34;AE8Cp1u8I9t52OYW7oGU4w==&#34;,&#xA;      &#34;HNpGGr9eP5twQKC3yCh1mA==&#34;,&#xA;      &#34;O8fIVXqcGshIonMWsEH9gA==&#34;,&#xA;      &#34;EQ4eP3gKo3y8JsWUiWr6+g==&#34;,&#xA;      &#34;XygysGe2kdlyCRQHM1fu3w==&#34;,&#xA;      &#34;OPNDKUsVLJt2v1gO1zvkBA==&#34;,&#xA;      &#34;YiJlkUTKf0/7+ORZMmQ2cw==&#34;,&#xA;      &#34;4/mftydHpy90Umw3G0mTuQ==&#34;,&#xA;      &#34;klCkJxhhNVG564GOUQMh+Q==&#34;,&#xA;      &#34;/QaL/BUIdoF2MAB/C1YiGQ==&#34;,&#xA;      &#34;yGCmffaimhyTCMJRNZflXg==&#34;&#xA;    ],&#xA;    &#34;YjDcGmvP0/z8VqRiUvkhOQ==&#34;: [&#xA;      &#34;yuFlxOGqQlDuMCywIIELNw==&#34;,&#xA;      &#34;sThg2GGoKqa1RTJ5skEJTA==&#34;,&#xA;      &#34;W/d4trZ7jb2yxjrq4cNOWA==&#34;,&#xA;      &#34;0nQ3GJDLY22M176Z5ESg6A==&#34;&#xA;    ],&#xA;    &#34;auI8KtI6OozP7EAIr9UlQQ==&#34;: [&#xA;      &#34;icj6a8bc4dYK/DJNvkU0+A==&#34;&#xA;    ],&#xA;    &#34;bWUdPEYmtshwdmuX5VapfQ==&#34;: [&#xA;      &#34;WGvgNwrW2u5APZcidQ6v1Q==&#34;&#xA;    ],&#xA;    &#34;f/Al/eNlUhjEgKSV0J2z7w==&#34;: [&#xA;      &#34;QSNBg/XspHcBwSxBTMU4rg==&#34;,&#xA;      &#34;xKLQGv5zNwcnWtQQKiO3Ww==&#34;,&#xA;      &#34;gaFOKxy9D9KR/Iyd+kDZoA==&#34;,&#xA;      &#34;HuLJLN6ajygY/CpLyzV5lw==&#34;,&#xA;      &#34;8I2jFG8JRR+6+eqqYlXhAg==&#34;&#xA;    ],&#xA;    &#34;h53SWWmMQUh4cLyBmYeNvw==&#34;: [&#xA;      &#34;Bgew407C4GMDdNe8dNeN7w==&#34;,&#xA;      &#34;9jHXNtwzqlOir/Op7pd9+w==&#34;,&#xA;      &#34;Rw8DyDlyRHRJOeZaAbGMRA==&#34;,&#xA;      &#34;A1UDSDMkPKOSx7ma/geQyg==&#34;,&#xA;      &#34;MW3KGjkk7BWuR5JCc6cywg==&#34;,&#xA;      &#34;kYYDrncBncmKkmFnSd5t3w==&#34;,&#xA;      &#34;teoauN/Djw6odXikmjP4Lw==&#34;,&#xA;      &#34;7lnphmrb/VojuhlikpNO5w==&#34;,&#xA;      &#34;sExC9WXn4M01POjg0haQrA==&#34;&#xA;    ],&#xA;    &#34;hSTTMcRX1DBcXc+8jKeg3Q==&#34;: [&#xA;      &#34;sRVcQFAdq4Ll42smqacaCw==&#34;,&#xA;      &#34;mouoWVvs12H8FynnB5qIsQ==&#34;,&#xA;      &#34;ieASPdYzGxWke8nZZhE02Q==&#34;&#xA;    ],&#xA;    &#34;isPl2YxnCTfcLmUYH6Q0sA==&#34;: [&#xA;      &#34;WGvgNwrW2u5APZcidQ6v1Q==&#34;&#xA;    ],&#xA;    &#34;j5YRt82iOHry4ndSyCLgaA==&#34;: [&#xA;      &#34;/1CYFiexnJcM7p4YrI/FVg==&#34;,&#xA;      &#34;eCNdMtt9JN2Rrb8I23NIsA==&#34;,&#xA;      &#34;RdjNn4dAdZKcn6VS95a/SQ==&#34;,&#xA;      &#34;K3eafQ/8P8PEZ3BPWZfCgg==&#34;,&#xA;      &#34;UyCjBcpeB0nhkRTVhUcAJQ==&#34;,&#xA;      &#34;kCsMurCi7F77HxJoLqd9jA==&#34;,&#xA;      &#34;0WTD6ZUY2Zj2w0R3oyPWRw==&#34;,&#xA;      &#34;9oBjtBiHtz7+Hwc4swPaAw==&#34;,&#xA;      &#34;3IgZDz5UYkhu/U1/4kSWKg==&#34;&#xA;    ],&#xA;    &#34;jSeaYCeiTMhbTniYmwK8dQ==&#34;: [&#xA;      &#34;mRazAXjBcgFrTolNDZHDsA==&#34;,&#xA;      &#34;h6rS2s3xilGaG0a+pIjl8A==&#34;,&#xA;      &#34;mVT54HSCxoOy6IF9Noa/Zw==&#34;,&#xA;      &#34;sGwL9v57mGx7f18qBkIacA==&#34;,&#xA;      &#34;6Xr5PbPGSy+aHLDQ9q4L9w==&#34;,&#xA;      &#34;RVCidRUm4D1IKoPhoUi2AA==&#34;,&#xA;      &#34;L3k0cIIlkMGQFiWnZm8Mlg==&#34;,&#xA;      &#34;XXiaw1EwhFkuilI94EKiqQ==&#34;,&#xA;      &#34;X37PWFfcTFBuBxL2613UQg==&#34;,&#xA;      &#34;0QzoXQSqkKieJ7Oc+px0JA==&#34;,&#xA;      &#34;8qOJVWAut1+UqTXPOWH12g==&#34;,&#xA;      &#34;HB9r/GLycEmk6aXttwtBlw==&#34;,&#xA;      &#34;2U8ppg+02PjFDuM5YqFstQ==&#34;,&#xA;      &#34;HKrLnQyTw1292mNt3MQ0aQ==&#34;,&#xA;      &#34;ZlxfTVb/4bi6yWQ+JLaOnw==&#34;,&#xA;      &#34;nYtstWEUOCTbjAlmYOKURA==&#34;,&#xA;      &#34;5ZHvcDYhgzWjwNpRgF2u1w==&#34;,&#xA;      &#34;IItHEdPWz5fl9O7ZhzjDAA==&#34;,&#xA;      &#34;OFdQC3/0S5rItoyqpACTFw==&#34;,&#xA;      &#34;8rvqTFlh9aOz4UvxQN0SBQ==&#34;,&#xA;      &#34;cCowLuOsLfTMmPFOoqUVww==&#34;&#xA;    ],&#xA;    &#34;k/BpvWmZ5EVfmiPqpZ3pGw==&#34;: [&#xA;      &#34;qC/lM94bJkHuTCcx6Z47mQ==&#34;,&#xA;      &#34;KExChYIaW0MvXNLWbjS/Hw==&#34;,&#xA;      &#34;RYqFgDYIttLgJc8B82sK/w==&#34;,&#xA;      &#34;xYjfT47p5BaLoMKfWyn2HQ==&#34;,&#xA;      &#34;Lt2Hg7sVYgz0GD7ldFmjjA==&#34;,&#xA;      &#34;tYeLT/YUKIk7yaK07WvPeA==&#34;&#xA;    ],&#xA;    &#34;k4gCNgIfg7MM/e42ThRx2w==&#34;: [&#xA;      &#34;n83jaRl/T6kiaoMyWtX8xw==&#34;,&#xA;      &#34;AZQ9MHTiNLYiRU7sYZlVGw==&#34;&#xA;    ],&#xA;    &#34;ka4b0+TZOGmroTz/rrRQcg==&#34;: [&#xA;      &#34;+nHq7dak7Hkjcru/xpwzhQ==&#34;,&#xA;      &#34;L7QbkTbsy8v3tMfOqNsVKQ==&#34;&#xA;    ],&#xA;    &#34;kwc9NYOQig+qWs5qmBRL/w==&#34;: [&#xA;      &#34;xCUiEQAH1lfhrKtUxQDIYA==&#34;,&#xA;      &#34;HuOxI+pWjgGV0XsBvltzlg==&#34;,&#xA;      &#34;SHxE0qXbBmDEp/LL1ieJeA==&#34;,&#xA;      &#34;rEg00U8+//igCt+0+QBUhA==&#34;,&#xA;      &#34;jw1ZiDut5Ot+DyVFjCrixg==&#34;,&#xA;      &#34;673FKazcUiydbfN5c6amaw==&#34;,&#xA;      &#34;ZTGiJlkqcqrCLJSY/Sq8lA==&#34;,&#xA;      &#34;VsocCwaFpF6PzdX5PxR+sQ==&#34;,&#xA;      &#34;S7qx7a03HASsJhyQafvXjg==&#34;&#xA;    ],&#xA;    &#34;lU0MYRg2dg5wynl2dMGsgA==&#34;: [&#xA;      &#34;hfBpyVezkUAf98QWnlvzIA==&#34;&#xA;    ],&#xA;    &#34;mtrWxjnWyzrIFOuHVeUG6g==&#34;: [&#xA;      &#34;UoEFDYM+Gqf2mdRJh5HUFw==&#34;,&#xA;      &#34;8rxYDEPu2XxazQ3cBUhX0Q==&#34;,&#xA;      &#34;9uK7ZDYgFtqP786n0QunAg==&#34;,&#xA;      &#34;UMD4nV1Ky5C5eKUMgtnKzw==&#34;,&#xA;      &#34;W/DMqBRMDYVkVH3D67luGg==&#34;,&#xA;      &#34;XBiy/XVR6SoThCkYUmkD1g==&#34;,&#xA;      &#34;vx2N2RZTm7neux8kVlqgEg==&#34;&#xA;    ],&#xA;    &#34;oSDtB9GflLljTYeOAikyIQ==&#34;: [&#xA;      &#34;0fCtWwB6iclgRvIA+IqiJQ==&#34;,&#xA;      &#34;EiL50P2QSOoRA18XAAH6Pg==&#34;,&#xA;      &#34;EKs36DFwHVCzU/cF0Be9pQ==&#34;,&#xA;      &#34;xLIujTim86EomaRofe4tDg==&#34;,&#xA;      &#34;KaROgE0QmtiOixMG9Wi1RA==&#34;,&#xA;      &#34;ElIjMFAz33tt/XVMysRkdA==&#34;,&#xA;      &#34;jguV9kU5iHC5V/cF3+b/tg==&#34;,&#xA;      &#34;Oi3Y6I7JDcoQrQyH+jMXWw==&#34;,&#xA;      &#34;p2qAiuM4AsdQ5J4fBWvbBA==&#34;,&#xA;      &#34;iEGZHZXt8HWPSM5eJesddQ==&#34;,&#xA;      &#34;npBrFSWnZYxq9cizdfDfCQ==&#34;,&#xA;      &#34;ngbKDtxhn33NKWC2lhOQNQ==&#34;&#xA;    ],&#xA;    &#34;peUaHHW4E9Y6Nd8+gJR5cQ==&#34;: [&#xA;      &#34;eohUFw28jV3sGLZE2CBPXA==&#34;,&#xA;      &#34;H9Ud41wofJc/QlL6Rm7WkA==&#34;,&#xA;      &#34;avzu5SRbIjcduH4QdmZ1gg==&#34;,&#xA;      &#34;OgFGrvrnAoXXvapnatTrxQ==&#34;,&#xA;      &#34;XbpXfbeApuDuIKvY0/qWiA==&#34;,&#xA;      &#34;ruDQdx7OmIsgMCpioWbqOQ==&#34;,&#xA;      &#34;zMNYUY09QO2aCVD23XG4dw==&#34;,&#xA;      &#34;npQpPXYG8xMJ1LRSVSnKGA==&#34;,&#xA;      &#34;KCgCqCavM9U0xL+GHJqzSg==&#34;,&#xA;      &#34;Rfm1tD+QxSP/TVjKFDNabg==&#34;&#xA;    ],&#xA;    &#34;y1KXv1Wa0o6q+5/jJ4FmmA==&#34;: [&#xA;      &#34;RXjd5U95osIGXnqCa34Jkg==&#34;,&#xA;      &#34;HdAyLUATPStr/HXiy9fgQw==&#34;,&#xA;      &#34;92KuvWwbPhsQNPu0knrHAQ==&#34;,&#xA;      &#34;G7IyfoPhe9f8QzIGbOfn7Q==&#34;,&#xA;      &#34;TLOrmSYL76Du+GI4WD9gMQ==&#34;,&#xA;      &#34;7Puka2o1jq4jSr2Hekrfhg==&#34;,&#xA;      &#34;xjRJnKlNaH/FGi0NN5VKBQ==&#34;,&#xA;      &#34;yePhQ2wYSrZV2+z+gEbpRg==&#34;,&#xA;      &#34;EiJx6rOT8KoLX+Wu7/N6HQ==&#34;&#xA;    ],&#xA;    &#34;yI01txXPQZENPfjF45L+Zw==&#34;: [&#xA;      &#34;+nHq7dak7Hkjcru/xpwzhQ==&#34;,&#xA;      &#34;L7QbkTbsy8v3tMfOqNsVKQ==&#34;&#xA;    ],&#xA;    &#34;yX08xXm2MSxk7s6Ui2Z6BQ==&#34;: [&#xA;      &#34;H2CablNBrQ/I5AsUjk5xyw==&#34;,&#xA;      &#34;BooDzA4nzaDI1l3E5zAHgg==&#34;,&#xA;      &#34;1lUHOMB3ANHGWpqCBv9Ynw==&#34;,&#xA;      &#34;a067YUjLHWzR99JNl/RtGQ==&#34;,&#xA;      &#34;t3XJyztcU9aOXTMLI8NRmA==&#34;&#xA;    ]&#xA;  },&#xA;  &#34;enrichments&#34;: {}&#xA;}&#xA;&#xA;pod: test-comp-pac-gitlab-axhyxp8750c7426def474b8d17d753c7d361da-pod | container step-oci-attach-report: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp&#xA;Attaching clair-report-amd64.json to quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp@sha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa&#xA;Executing: oras attach --no-tty --format go-template={{.digest}} --registry-config /home/oras/auth.json --artifact-type application/vnd.redhat.clair-report+json quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp@sha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa clair-report-amd64.json:application/vnd.redhat.clair-report+json&#xA;&#xA;pod: test-comp-pac-gitlab-axhyxp8750c7426def474b8d17d753c7d361da-pod | container step-conftest-vulnerabilities: &#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/tekton/home/clair-result-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 5,&#xA;&#x9;&#x9;&#34;warnings&#34;: [&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with high vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libarchive-3.3.3-6.el8_10 (CVE-2026-4424)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_high_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 1&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched high vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: python3-libs-3.6.8-75.el8_10 (CVE-2026-4786, CVE-2026-6100), libcap-2.48-6.el8_9 (CVE-2026-4878), java-17-openjdk-headless-1:17.0.18.0.8-1.el8 (CVE-2025-66293, CVE-2026-25646, CVE-2026-26740), platform-python-3.6.8-75.el8_10 (CVE-2026-4786, CVE-2026-6100)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_high_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 8&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with medium vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libarchive-3.3.3-6.el8_10 (CVE-2026-5121)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_medium_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 1&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched medium vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libcurl-7.61.1-34.el8_10.11 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805), libssh-0.9.6-16.el8_10 (CVE-2025-5351, CVE-2025-8114, CVE-2026-0964, CVE-2026-0966, CVE-2026-3731), libzstd-1.4.4-1.el8 (CVE-2022-4899), alsa-lib-1.2.10-2.el8 (CVE-2026-25068), libssh-config-0.9.6-16.el8_10 (CVE-2025-5351, CVE-2025-8114, CVE-2026-0964, CVE-2026-0966, CVE-2026-3731), gnupg2-2.2.20-4.el8_10 (CVE-2025-68972), cups-libs-1:2.2.6-67.el8_10 (CVE-2023-4504, CVE-2026-27447, CVE-2026-34978, CVE-2026-34979, CVE-2026-34980, CVE-2026-34990, CVE-2026-39314, CVE-2026-39316), python3-libs-3.6.8-75.el8_10 (CVE-2025-11468, CVE-2025-12781, CVE-2025-13837, CVE-2025-15282, CVE-2025-4516, CVE-2025-6069, CVE-2025-8291, CVE-2026-0672, CVE-2026-1502, CVE-2026-3644, CVE-2026-4224, CVE-2026-5713), systemd-libs-239-82.el8_10.15 (CVE-2018-20839, CVE-2025-4598, CVE-2026-29111, CVE-2026-4105), expat-2.5.0-1.el8_10 (CVE-2026-32776, CVE-2026-32777, CVE-2026-32778), openldap-2.4.46-21.el8_10 (CVE-2026-22185), file-libs-5.33-27.el8_10 (CVE-2019-8905), python3-pip-wheel-9.0.3-24.el8 (CVE-2023-45803, CVE-2025-50181, CVE-2025-50182, CVE-2026-25645), glibc-common-2.28-251.el8_10.31 (CVE-2026-4046, CVE-2026-4437), libblkid-2.32.1-48.el8_10 (CVE-2026-27456), glib2-2.56.4-168.el8_10 (CVE-2025-14087, CVE-2025-14512, CVE-2026-1484, CVE-2026-1489), libsmartcols-2.32.1-48.el8_10 (CVE-2026-27456), xz-libs-5.2.4-4.el8_6 (CVE-2026-34743), glibc-minimal-langpack-2.28-251.el8_10.31 (CVE-2026-4046, CVE-2026-4437), libarchive-3.3.3-6.el8_10 (CVE-2024-57970, CVE-2025-25724, CVE-2025-60753, CVE-2026-4426, CVE-2026-5745), curl-7.61.1-34.el8_10.11 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805), coreutils-single-8.30-17.el8_10 (CVE-2025-5278), tar-2:1.30-11.el8_10 (CVE-2025-45582, CVE-2025-64118, CVE-2026-33056, CVE-2026-5704), openssl-libs-1:1.1.1k-15.el8_6 (CVE-2023-0466, CVE-2026-28390), java-17-openjdk-headless-1:17.0.18.0.8-1.el8 (CVE-2025-28164, CVE-2025-64505, CVE-2025-64506, CVE-2026-22693, CVE-2026-22695, CVE-2026-22801, CVE-2026-23865, CVE-2026-33416, CVE-2026-33636, CVE-2026-34757), platform-python-3.6.8-75.el8_10 (CVE-2025-11468, CVE-2025-12781, CVE-2025-13837, CVE-2025-15282, CVE-2025-4516, CVE-2025-6069, CVE-2025-8291, CVE-2026-0672, CVE-2026-1502, CVE-2026-3644, CVE-2026-4224, CVE-2026-5713), libxml2-2.9.7-21.el8_10.3 (CVE-2025-9714, CVE-2026-0990, CVE-2026-1757), glibc-2.28-251.el8_10.31 (CVE-2026-4046, CVE-2026-4437), libgcrypt-1.8.5-7.el8_6 (CVE-2019-12904, CVE-2024-2236), libuuid-2.32.1-48.el8_10 (CVE-2026-27456), libmount-2.32.1-48.el8_10 (CVE-2026-27456), avahi-libs-0.7-27.el8_10.1 (CVE-2024-52615, CVE-2024-52616, CVE-2025-59529, CVE-2025-68276, CVE-2025-68468, CVE-2025-68471, CVE-2026-24401, CVE-2026-34933)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_medium_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 120&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: ncurses-libs-6.1-10.20180224.el8 (CVE-2018-19211, CVE-2020-19185, CVE-2020-19186, CVE-2020-19187, CVE-2020-19188, CVE-2020-19189, CVE-2020-19190, CVE-2021-39537, CVE-2023-50495), sqlite-libs-3.26.0-20.el8_10 (CVE-2019-19244, CVE-2019-9936, CVE-2019-9937, CVE-2024-0232, CVE-2025-70873), libtasn1-4.13-5.el8_10 (CVE-2018-1000654, CVE-2025-13151), elfutils-libelf-0.190-2.el8 (CVE-2024-25260), libcurl-7.61.1-34.el8_10.11 (CVE-2023-27534, CVE-2024-11053, CVE-2024-7264, CVE-2025-14524, CVE-2025-14819, CVE-2025-15079, CVE-2025-15224), libssh-0.9.6-16.el8_10 (CVE-2025-4878, CVE-2025-8277, CVE-2026-0965, CVE-2026-0967, CVE-2026-0968), ncurses-base-6.1-10.20180224.el8 (CVE-2018-19211, CVE-2020-19185, CVE-2020-19186, CVE-2020-19187, CVE-2020-19188, CVE-2020-19189, CVE-2020-19190, CVE-2021-39537, CVE-2023-50495), libzstd-1.4.4-1.el8 (CVE-2021-24032), libstdc++-8.5.0-28.el8_10 (CVE-2018-20657, CVE-2019-14250, CVE-2022-27943), libssh-config-0.9.6-16.el8_10 (CVE-2025-4878, CVE-2025-8277, CVE-2026-0965, CVE-2026-0967, CVE-2026-0968), gnupg2-2.2.20-4.el8_10 (CVE-2022-3219, CVE-2025-30258, CVE-2026-24883), dbus-libs-1:1.12.8-27.el8_10 (CVE-2020-35512), cups-libs-1:2.2.6-67.el8_10 (CVE-2021-25317), python3-libs-3.6.8-75.el8_10 (CVE-2019-9674, CVE-2024-0397, CVE-2024-7592, CVE-2025-1795, CVE-2025-6075, CVE-2026-2297, CVE-2026-3479), systemd-libs-239-82.el8_10.15 (CVE-2021-3997), expat-2.5.0-1.el8_10 (CVE-2025-66382, CVE-2026-24515, CVE-2026-41080), nss-sysinit-3.112.0-4.el8_10 (CVE-2020-12413, CVE-2024-7531), gawk-4.2.1-4.el8 (CVE-2023-4156), file-libs-5.33-27.el8_10 (CVE-2019-8906), python3-pip-wheel-9.0.3-24.el8 (CVE-2018-20225), nss-softokn-3.112.0-4.el8_10 (CVE-2020-12413, CVE-2024-7531), glibc-common-2.28-251.el8_10.31 (CVE-2026-4438), zlib-1.2.11-25.el8 (CVE-2026-27171), glib2-2.56.4-168.el8_10 (CVE-2023-29499, CVE-2023-32611, CVE-2023-32636, CVE-2023-32665, CVE-2025-3360, CVE-2025-7039, CVE-2026-0988, CVE-2026-1485), libgcc-8.5.0-28.el8_10 (CVE-2018-20657, CVE-2019-14250, CVE-2022-27943), glibc-minimal-langpack-2.28-251.el8_10.31 (CVE-2026-4438), libarchive-3.3.3-6.el8_10 (CVE-2018-1000879, CVE-2018-1000880, CVE-2025-1632, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917, CVE-2025-5918), nss-3.112.0-4.el8_10 (CVE-2020-12413, CVE-2024-7531), curl-7.61.1-34.el8_10.11 (CVE-2023-27534, CVE-2024-11053, CVE-2024-7264, CVE-2025-14524, CVE-2025-14819, CVE-2025-15079, CVE-2025-15224), nss-softokn-freebl-3.112.0-4.el8_10 (CVE-2020-12413, CVE-2024-7531), gnutls-3.6.16-8.el8_10.5 (CVE-2021-4209), tar-2:1.30-11.el8_10 (CVE-2019-9923, CVE-2021-20193, CVE-2023-39804), openssl-libs-1:1.1.1k-15.el8_6 (CVE-2023-0464, CVE-2023-0465, CVE-2023-2650, CVE-2024-0727, CVE-2024-13176, CVE-2024-2511, CVE-2024-41996, CVE-2024-4741, CVE-2025-15468, CVE-2025-15469, CVE-2025-68160, CVE-2025-69418, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796, CVE-2026-2673, CVE-2026-28386, CVE-2026-28388, CVE-2026-28389, CVE-2026-31789), shadow-utils-2:4.6-23.el8_10 (CVE-2024-56433), java-17-openjdk-headless-1:17.0.18.0.8-1.el8 (CVE-2022-3857, CVE-2026-27171), platform-python-3.6.8-75.el8_10 (CVE-2019-9674, CVE-2024-0397, CVE-2024-7592, CVE-2025-1795, CVE-2025-6075, CVE-2026-2297, CVE-2026-3479), libxml2-2.9.7-21.el8_10.3 (CVE-2023-45322, CVE-2024-34459, CVE-2025-27113, CVE-2025-6170, CVE-2026-0989, CVE-2026-0992), glibc-2.28-251.el8_10.31 (CVE-2026-4438), nss-util-3.112.0-4.el8_10 (CVE-2020-12413, CVE-2024-7531), pcre2-10.32-3.el8_6 (CVE-2022-41409), avahi-libs-0.7-27.el8_10.1 (CVE-2017-6519)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_low_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 148&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;]&#xA;&#x9;}&#xA;]&#xA;{&#34;vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:1,&#34;medium&#34;:1,&#34;low&#34;:0,&#34;unknown&#34;:0},&#34;unpatched_vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:8,&#34;medium&#34;:120,&#34;low&#34;:148,&#34;unknown&#34;:0}}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp:on-pr-6b9cafb5b333281f9bcc7367785e0b17ad4ca3d2&#34;, &#34;digests&#34;: [&#34;sha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa&#34;]}}&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:59:51+00:00&#34;,&#34;note&#34;:&#34;Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA; pod: test-comp-pac-gitlab-axhyxp9a38f83d8636c6ca87bb8a2e1af8eec9-pod | init container: prepare&#xA;2026/04/19 13:57:43 Entrypoint initialization&#xA;&#xA; pod: test-comp-pac-gitlab-axhyxp9a38f83d8636c6ca87bb8a2e1af8eec9-pod | init container: place-scripts&#xA;2026/04/19 13:57:44 Decoded script /tekton/scripts/script-0-4gfwd&#xA;2026/04/19 13:57:44 Decoded script /tekton/scripts/script-1-rrfnt&#xA;2026/04/19 13:57:44 Decoded script /tekton/scripts/script-2-cjfk5&#xA;2026/04/19 13:57:44 Decoded script /tekton/scripts/script-3-2rvp9&#xA;2026/04/19 13:57:44 Decoded script /tekton/scripts/script-4-m8x6k&#xA;2026/04/19 13:57:44 Decoded script /tekton/scripts/script-5-xss4h&#xA;&#xA;pod: test-comp-pac-gitlab-axhyxp9a38f83d8636c6ca87bb8a2e1af8eec9-pod | container step-introspect: &#xA;Artifact type will be determined by introspection.&#xA;Checking the media type of the OCI artifact...&#xA;[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp:on-pr-6b9cafb5b333281f9bcc7367785e0b17ad4ca3d2&#xA;The media type of the OCI artifact is application/vnd.docker.distribution.manifest.v2+json.&#xA;Looking for image labels that indicate this might be an operator bundle...&#xA;[retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp:on-pr-6b9cafb5b333281f9bcc7367785e0b17ad4ca3d2&#xA;Found 0 matching labels.&#xA;Expecting 3 or more to identify this image as an operator bundle.&#xA;Introspection concludes that this artifact is of type &#34;application&#34;.&#xA;&#xA;pod: test-comp-pac-gitlab-axhyxp9a38f83d8636c6ca87bb8a2e1af8eec9-pod | container step-generate-container-auth: &#xA;Selecting auth for quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp:on-pr-6b9cafb5b333281f9bcc7367785e0b17ad4ca3d2&#xA;Using token for quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp&#xA;Auth json written to &#34;/auth/auth.json&#34;.&#xA;&#xA;pod: test-comp-pac-gitlab-axhyxp9a38f83d8636c6ca87bb8a2e1af8eec9-pod | container step-set-skip-for-bundles: &#xA;2026/04/19 13:57:50 INFO Step was skipped due to when expressions were evaluated to false.&#xA;&#xA;pod: test-comp-pac-gitlab-axhyxp9a38f83d8636c6ca87bb8a2e1af8eec9-pod | container step-app-check: &#xA;time=&#34;2026-04-19T13:57:50Z&#34; level=info msg=&#34;certification library version&#34; version=&#34;1.17.1 &lt;commit: f7de82ae1c76e6c10ea94967d6b6a66f96248cbe&gt;&#34;&#xA;time=&#34;2026-04-19T13:57:50Z&#34; level=info msg=&#34;running checks for quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp:on-pr-6b9cafb5b333281f9bcc7367785e0b17ad4ca3d2 for platform amd64&#34;&#xA;time=&#34;2026-04-19T13:57:50Z&#34; level=info msg=&#34;target image&#34; image=&#34;quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp:on-pr-6b9cafb5b333281f9bcc7367785e0b17ad4ca3d2&#34;&#xA;time=&#34;2026-04-19T13:57:58Z&#34; level=info msg=&#34;warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-3041931381/fs/licenses: no such file or directory&#34; check=HasLicense&#xA;time=&#34;2026-04-19T13:57:58Z&#34; level=info msg=&#34;check completed&#34; check=HasLicense result=FAILED&#xA;time=&#34;2026-04-19T13:57:58Z&#34; level=info msg=&#34;check completed&#34; check=HasUniqueTag result=PASSED&#xA;time=&#34;2026-04-19T13:57:58Z&#34; level=info msg=&#34;check completed&#34; check=LayerCountAcceptable result=PASSED&#xA;time=&#34;2026-04-19T13:57:58Z&#34; level=info msg=&#34;check completed&#34; check=HasNoProhibitedPackages result=PASSED&#xA;time=&#34;2026-04-19T13:57:58Z&#34; level=info msg=&#34;check completed&#34; check=HasRequiredLabel result=PASSED&#xA;time=&#34;2026-04-19T13:57:58Z&#34; level=info msg=&#34;USER 185 specified that is non-root&#34; check=RunAsNonRoot&#xA;time=&#34;2026-04-19T13:57:58Z&#34; level=info msg=&#34;check completed&#34; check=RunAsNonRoot result=PASSED&#xA;time=&#34;2026-04-19T13:58:07Z&#34; level=info msg=&#34;check completed&#34; check=HasModifiedFiles result=PASSED&#xA;time=&#34;2026-04-19T13:58:07Z&#34; level=info msg=&#34;check completed&#34; check=BasedOnUbi result=PASSED&#xA;time=&#34;2026-04-19T13:58:07Z&#34; level=info msg=&#34;This image&#39;s tag on-pr-6b9cafb5b333281f9bcc7367785e0b17ad4ca3d2 will be paired with digest sha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.&#34;&#xA;{&#xA;    &#34;image&#34;: &#34;quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp:on-pr-6b9cafb5b333281f9bcc7367785e0b17ad4ca3d2&#34;,&#xA;    &#34;passed&#34;: false,&#xA;    &#34;test_library&#34;: {&#xA;        &#34;name&#34;: &#34;github.com/redhat-openshift-ecosystem/openshift-preflight&#34;,&#xA;        &#34;version&#34;: &#34;1.17.1&#34;,&#xA;        &#34;commit&#34;: &#34;f7de82ae1c76e6c10ea94967d6b6a66f96248cbe&#34;&#xA;    },&#xA;    &#34;results&#34;: {&#xA;        &#34;passed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasUniqueTag&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has a tag other than &#39;latest&#39;, so that the image can be uniquely identified.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;LayerCountAcceptable&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasNoProhibitedPackages&#34;,&#xA;                &#34;elapsed_time&#34;: 35,&#xA;                &#34;description&#34;: &#34;Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasRequiredLabel&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;RunAsNonRoot&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasModifiedFiles&#34;,&#xA;                &#34;elapsed_time&#34;: 8867,&#xA;                &#34;description&#34;: &#34;Checks that no files installed via RPM in the base Red Hat layer have been modified&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;BasedOnUbi&#34;,&#xA;                &#34;elapsed_time&#34;: 146,&#xA;                &#34;description&#34;: &#34;Checking if the container&#39;s base image is based upon the Red Hat Universal Base Image (UBI)&#34;&#xA;            }&#xA;        ],&#xA;        &#34;failed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasLicense&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses&#34;,&#xA;                &#34;help&#34;: &#34;Check HasLicense encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            }&#xA;        ],&#xA;        &#34;errors&#34;: []&#xA;    }&#xA;}&#xA;time=&#34;2026-04-19T13:58:07Z&#34; level=info msg=&#34;Preflight result: FAILED&#34;&#xA;&#xA;pod: test-comp-pac-gitlab-axhyxp9a38f83d8636c6ca87bb8a2e1af8eec9-pod | container step-app-set-outcome: &#xA;{&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1776607087&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp:on-pr-6b9cafb5b333281f9bcc7367785e0b17ad4ca3d2&#xA;&#xA;pod: test-comp-pac-gitlab-axhyxp9a38f83d8636c6ca87bb8a2e1af8eec9-pod | container step-final-outcome: &#xA;+ [[ ! -f /mount/konflux.results.json ]]&#xA;+ tee /tekton/steps/step-final-outcome/results/test-output&#xA;{&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1776607087&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}&#xA; pod: test-comp-pac-gitlab-axhyxpbbbc9bb9fd165241236b845b7225a833-pod | init container: prepare&#xA;2026/04/19 13:56:44 Entrypoint initialization&#xA;&#xA;pod: test-comp-pac-gitlab-axhyxpbbbc9bb9fd165241236b845b7225a833-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-04-19T13:56:47Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp:on-pr-6b9cafb5b333281f9bcc7367785e0b17ad4ca3d2&#34;&#xA;time=&#34;2026-04-19T13:56:47Z&#34; level=info msg=&#34;[param] digest: sha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa&#34;&#xA;time=&#34;2026-04-19T13:56:47Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-04-19T13:56:48Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}&#xA; pod: test-comp-pac-gitlab-axhyxpf532a7dc04794b7ae334ed4148bcf871-pod | init container: prepare&#xA;2026/04/19 13:57:42 Entrypoint initialization&#xA;&#xA; pod: test-comp-pac-gitlab-axhyxpf532a7dc04794b7ae334ed4148bcf871-pod | init container: place-scripts&#xA;2026/04/19 13:57:43 Decoded script /tekton/scripts/script-0-kmmzj&#xA;2026/04/19 13:57:43 Decoded script /tekton/scripts/script-1-vm977&#xA;&#xA;pod: test-comp-pac-gitlab-axhyxpf532a7dc04794b7ae334ed4148bcf871-pod | container step-extract-and-scan-image: &#xA;Starting clamd ...&#xA;clamd is ready!&#xA;Detecting artifact type for quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp@sha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa.&#xA;Detected container image. Processing image manifests.&#xA;Running &#34;oc image extract&#34; on image of arch amd64&#xA;Scanning image for arch amd64. This operation may take a while.&#xA;&#xA;----------- SCAN SUMMARY -----------&#xA;Infected files: 0&#xA;Time: 44.601 sec (0 m 44 s)&#xA;Start Date: 2026:04:19 13:58:01&#xA;End Date:   2026:04:19 13:58:46&#xA;Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27975/Sat Apr 18 06:26:10 2026 Database version: 27975&#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 2&#xA;&#x9;}&#xA;]&#xA;{&#34;timestamp&#34;:&#34;1776607126&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1776607126&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1776607126&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp:on-pr-6b9cafb5b333281f9bcc7367785e0b17ad4ca3d2&#34;, &#34;digests&#34;: [&#34;sha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa&#34;]}}&#xA;&#xA;pod: test-comp-pac-gitlab-axhyxpf532a7dc04794b7ae334ed4148bcf871-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp&#xA;Attaching to quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp:on-pr-6b9cafb5b333281f9bcc7367785e0b17ad4ca3d2&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp:on-pr-6b9cafb5b333281f9bcc7367785e0b17ad4ca3d2@sha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;Preparing clamscan-result-amd64.log&#xA;Preparing clamscan-ec-test-amd64.json&#xA;Uploading 732589a20cc6 clamscan-result-amd64.log&#xA;Uploading 32585a880790 clamscan-ec-test-amd64.json&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploaded  32585a880790 clamscan-ec-test-amd64.json&#xA;Uploaded  732589a20cc6 clamscan-result-amd64.log&#xA;Uploading 98f1dcbc1646 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  98f1dcbc1646 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp:on-pr-6b9cafb5b333281f9bcc7367785e0b17ad4ca3d2@sha256:579b3888d3459c75ee05081412d0ad0cace947df03745963ec5124fd4a16e6fa&#xA;Digest: sha256:98f1dcbc1646e245e591fa8913a9e19263c5a9915bd575288b534cb6dd2cf7d7&#xA;New PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-bph5k found after retrigger for component gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-bph5k found for Component gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-bph5k reason: ResolvingTaskRef&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-bph5k reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-bph5k reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-bph5k reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-bph5k reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-bph5k reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-bph5k reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-bph5k reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-bph5k reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-bph5k reason: Running&#xA;PipelineRun test-comp-pac-gitlab-axhyxp-on-pull-request-bph5k reason: Completed&#xA;&lt; Exit [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:148 @ 04/19/26 14:03:38.959 (11m32.513s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:03:38.959&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:03:38.959 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created should have a related PaC init MR is created [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.705995042">
              <system-err>&gt; Enter [It] should have a related PaC init MR is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:153 @ 04/19/26 14:03:38.96&#xA;&lt; Exit [It] should have a related PaC init MR is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:153 @ 04/19/26 14:03:39.666 (706ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:03:39.666&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:03:39.666 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully for component  [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="20.021706259">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for component  - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:172 @ 04/19/26 14:03:39.666&#xA;PipelineRun my-integration-test-home-486c4 found for Component gitlab-rep-ehhc/test-comp-pac-gitlab-axhyxp&#xA;PipelineRun my-integration-test-home-486c4 reason: Running&#xA;PipelineRun my-integration-test-home-486c4 reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for component  - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:172 @ 04/19/26 14:03:59.688 (20.021s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:03:59.688&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:03:59.688 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the PaC build pipelineRun run succeeded checks if the BuildPipelineRun have the annotation of chains signed [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.191696403">
              <system-err>&gt; Enter [It] checks if the BuildPipelineRun have the annotation of chains signed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:179 @ 04/19/26 14:03:59.688&#xA;&lt; Exit [It] checks if the BuildPipelineRun have the annotation of chains signed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:179 @ 04/19/26 14:03:59.88 (191ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:03:59.88&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:03:59.88 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the PaC build pipelineRun run succeeded checks if the Snapshot is created [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007529602">
              <system-err>&gt; Enter [It] checks if the Snapshot is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:183 @ 04/19/26 14:03:59.88&#xA;&lt; Exit [It] checks if the Snapshot is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:183 @ 04/19/26 14:03:59.888 (7ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:03:59.888&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:03:59.888 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the PaC build pipelineRun run succeeded checks if the Build PipelineRun got annotated with Snapshot name [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.098508472">
              <system-err>&gt; Enter [It] checks if the Build PipelineRun got annotated with Snapshot name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:188 @ 04/19/26 14:03:59.888&#xA;&lt; Exit [It] checks if the Build PipelineRun got annotated with Snapshot name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:188 @ 04/19/26 14:03:59.986 (98ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:03:59.987&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:03:59.987 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the Snapshot was created should find the Integration Test Scenario PipelineRun [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.089737566">
              <system-err>&gt; Enter [It] should find the Integration Test Scenario PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:194 @ 04/19/26 14:03:59.987&#xA;&lt; Exit [It] should find the Integration Test Scenario PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:194 @ 04/19/26 14:04:00.077 (89ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:00.077&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:00.077 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created should eventually complete successfully [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.213746058">
              <system-err>&gt; Enter [It] should eventually complete successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:207 @ 04/19/26 14:04:00.077&#xA;PipelineRun my-integration-test-home-486c4 reason: Succeeded&#xA;PipelineRun my-integration-test-sbds-nxdz9 reason: Succeeded&#xA;&lt; Exit [It] should eventually complete successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:207 @ 04/19/26 14:04:00.291 (213ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:00.291&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:00.291 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.174096432">
              <system-err>&gt; Enter [It] validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:212 @ 04/19/26 14:04:00.291&#xA;&lt; Exit [It] validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:212 @ 04/19/26 14:04:00.465 (174ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:00.465&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:00.465 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.366148942">
              <system-err>&gt; Enter [It] eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:229 @ 04/19/26 14:04:00.466&#xA;&lt; Exit [It] eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:229 @ 04/19/26 14:04:00.832 (366ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:00.832&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:00.832 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.148062424">
              <system-err>&gt; Enter [It] validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:233 @ 04/19/26 14:04:00.833&#xA;&lt; Exit [It] validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:233 @ 04/19/26 14:04:00.98 (148ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:00.98&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:00.98 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.38353484">
              <system-err>&gt; Enter [It] eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:250 @ 04/19/26 14:04:00.981&#xA;&lt; Exit [It] eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:250 @ 04/19/26 14:04:01.364 (383ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:01.364&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:01.364 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created validates at least one MR note contains the final integration test result [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.247894709">
              <system-err>&gt; Enter [It] validates at least one MR note contains the final integration test result - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:254 @ 04/19/26 14:04:01.365&#xA;&lt; Exit [It] validates at least one MR note contains the final integration test result - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:254 @ 04/19/26 14:04:01.612 (247ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:01.612&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:01.612 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created merging the PR should be successful [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="1.307342783">
              <system-err>&gt; Enter [It] merging the PR should be successful - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:278 @ 04/19/26 14:04:01.613&#xA;merged result sha: aa21dacba715d2abdabfe0c1e132aba96d1c791d for MR #17342&#xA;&lt; Exit [It] merging the PR should be successful - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:278 @ 04/19/26 14:04:02.92 (1.307s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:02.92&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:02.92 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created leads to triggering on push PipelineRun [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.01703608">
              <system-err>&gt; Enter [It] leads to triggering on push PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:288 @ 04/19/26 14:04:02.921&#xA;&lt; Exit [It] leads to triggering on push PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:288 @ 04/19/26 14:04:02.937 (17ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:02.938&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:02.938 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR should eventually complete successfully [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.09588638">
              <system-err>&gt; Enter [It] should eventually complete successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:303 @ 04/19/26 14:04:02.938&#xA;PipelineRun my-integration-test-home-486c4 reason: Succeeded&#xA;PipelineRun my-integration-test-sbds-nxdz9 reason: Succeeded&#xA;&lt; Exit [It] should eventually complete successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:303 @ 04/19/26 14:04:03.034 (96ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:03.034&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:03.034 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.169726446">
              <system-err>&gt; Enter [It] validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:308 @ 04/19/26 14:04:03.034&#xA;&lt; Exit [It] validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:308 @ 04/19/26 14:04:03.204 (169ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:03.204&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:03.204 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.346914332">
              <system-err>&gt; Enter [It] eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:325 @ 04/19/26 14:04:03.204&#xA;&lt; Exit [It] eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:325 @ 04/19/26 14:04:03.551 (347ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:03.551&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:03.551 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="0.201780698">
              <system-err>&gt; Enter [It] validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:329 @ 04/19/26 14:04:03.552&#xA;&lt; Exit [It] validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:329 @ 04/19/26 14:04:03.753 (201ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:03.753&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:03.753 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="passed" time="4.034744197">
              <system-err>&gt; Enter [It] eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:346 @ 04/19/26 14:04:03.754&#xA;&lt; Exit [It] eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:346 @ 04/19/26 14:04:04.122 (368ms)&#xA;&gt; Enter [AfterAll] Gitlab with status reporting of Integration tests in the assosiated merge request - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:94 @ 04/19/26 14:04:04.122&#xA;&lt; Exit [AfterAll] Gitlab with status reporting of Integration tests in the assosiated merge request - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:94 @ 04/19/26 14:04:07.788 (3.666s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:07.788&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/gitlab-integration-reporting.go:42 @ 04/19/26 14:04:07.789 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created triggers a build PipelineRun [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="79.330310266">
              <system-err>&gt; Enter [BeforeAll] with happy path for general flow of Integration service - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:52 @ 04/19/26 13:50:24.37&#xA;Image repository for component test-component-pac-ixoxue in namespace integration1-rywh do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component test-component-pac-ixoxue in namespace integration1-rywh do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] with happy path for general flow of Integration service - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:52 @ 04/19/26 13:51:03.674 (39.304s)&#xA;&gt; Enter [It] triggers a build PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:85 @ 04/19/26 13:51:03.674&#xA;no pipelinerun found for component test-component-pac-ixoxue (application: integ-app-zfwm, namespace: integration1-rywh)no pipelinerun found for component test-component-pac-ixoxue (application: integ-app-zfwm, namespace: integration1-rywh)&#xA;&lt; Exit [It] triggers a build PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:85 @ 04/19/26 13:51:43.7 (40.025s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 13:51:43.7&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 13:51:43.7 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created verifies if the build PipelineRun contains the finalizer [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.094983078">
              <system-err>&gt; Enter [It] verifies if the build PipelineRun contains the finalizer - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:90 @ 04/19/26 13:51:43.7&#xA;&lt; Exit [It] verifies if the build PipelineRun contains the finalizer - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:90 @ 04/19/26 13:51:43.795 (95ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 13:51:43.795&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 13:51:43.795 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created waits for build PipelineRun to succeed [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="580.021283642">
              <system-err>&gt; Enter [It] waits for build PipelineRun to succeed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:101 @ 04/19/26 13:51:43.796&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 found for Component integration1-rywh/test-component-pac-ixoxue&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun test-component-pac-ixoxue-on-pull-request-t6978 reason: Running&#xA;PipelineRun my-integration-test-rlko-jvg2n reason: Succeeded&#xA;&lt; Exit [It] waits for build PipelineRun to succeed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:101 @ 04/19/26 14:01:23.817 (9m40.021s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:23.817&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:23.817 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created should have a related PaC init PR created [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.24453795">
              <system-err>&gt; Enter [It] should have a related PaC init PR created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:107 @ 04/19/26 14:01:23.818&#xA;&lt; Exit [It] should have a related PaC init PR created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:107 @ 04/19/26 14:01:24.062 (244ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.062&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.062 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the BuildPipelineRun have the annotation of chains signed [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.018557044">
              <system-err>&gt; Enter [It] checks if the BuildPipelineRun have the annotation of chains signed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:128 @ 04/19/26 14:01:24.063&#xA;&lt; Exit [It] checks if the BuildPipelineRun have the annotation of chains signed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:128 @ 04/19/26 14:01:24.081 (18ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.081&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.081 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the Snapshot is created [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.006865327">
              <system-err>&gt; Enter [It] checks if the Snapshot is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:132 @ 04/19/26 14:01:24.081&#xA;&lt; Exit [It] checks if the Snapshot is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:132 @ 04/19/26 14:01:24.088 (7ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.088&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.088 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the Build PipelineRun got annotated with Snapshot name [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.016667779">
              <system-err>&gt; Enter [It] checks if the Build PipelineRun got annotated with Snapshot name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:137 @ 04/19/26 14:01:24.089&#xA;&lt; Exit [It] checks if the Build PipelineRun got annotated with Snapshot name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:137 @ 04/19/26 14:01:24.105 (16ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.105&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.105 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded verifies that the finalizer has been removed from the build pipelinerun [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.008591299">
              <system-err>&gt; Enter [It] verifies that the finalizer has been removed from the build pipelinerun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:141 @ 04/19/26 14:01:24.105&#xA;&lt; Exit [It] verifies that the finalizer has been removed from the build pipelinerun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:141 @ 04/19/26 14:01:24.114 (8ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.114&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.114 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if all of the integrationPipelineRuns passed [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="passed" time="0.013015821">
              <system-err>&gt; Enter [It] checks if all of the integrationPipelineRuns passed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:154 @ 04/19/26 14:01:24.114&#xA;Integration test scenario my-integration-test-rlko is found&#xA;PipelineRun my-integration-test-rlko-jvg2n reason: Succeeded&#xA;&lt; Exit [It] checks if all of the integrationPipelineRuns passed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:154 @ 04/19/26 14:01:24.127 (13ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.127&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.127 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the passed status of integration test is reported in the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007218184">
              <system-err>&gt; Enter [It] checks if the passed status of integration test is reported in the Snapshot - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:158 @ 04/19/26 14:01:24.128&#xA;&lt; Exit [It] checks if the passed status of integration test is reported in the Snapshot - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:158 @ 04/19/26 14:01:24.135 (7ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.135&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.135 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the skipped integration test is absent from the Snapshot&#39;s status annotation [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007243014">
              <system-err>&gt; Enter [It] checks if the skipped integration test is absent from the Snapshot&#39;s status annotation - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:173 @ 04/19/26 14:01:24.136&#xA;&lt; Exit [It] checks if the skipped integration test is absent from the Snapshot&#39;s status annotation - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:173 @ 04/19/26 14:01:24.142 (7ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.143&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.143 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the finalizer was removed from all of the related Integration pipelineRuns [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.012501422">
              <system-err>&gt; Enter [It] checks if the finalizer was removed from all of the related Integration pipelineRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:183 @ 04/19/26 14:01:24.143&#xA;Integration test scenario my-integration-test-rlko is found&#xA;&lt; Exit [It] checks if the finalizer was removed from all of the related Integration pipelineRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:183 @ 04/19/26 14:01:24.155 (12ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.155&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.155 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service creates a ReleasePlan [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.065720287">
              <system-err>&gt; Enter [It] creates a ReleasePlan - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:188 @ 04/19/26 14:01:24.156&#xA;IntegrationTestScenario my-integration-test-rlko is found&#xA;IntegrationTestScenario skipped-its is found&#xA;&lt; Exit [It] creates a ReleasePlan - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:188 @ 04/19/26 14:01:24.221 (65ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.221&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.221 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service creates an snapshot of push event [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.019602743">
              <system-err>&gt; Enter [It] creates an snapshot of push event - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:198 @ 04/19/26 14:01:24.222&#xA;&lt; Exit [It] creates an snapshot of push event - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:198 @ 04/19/26 14:01:24.241 (19ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.241&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.241 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when An snapshot of push event is created checks if the global candidate is updated after push event [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.012766806">
              <system-err>&gt; Enter [It] checks if the global candidate is updated after push event - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:205 @ 04/19/26 14:01:24.242&#xA;&lt; Exit [It] checks if the global candidate is updated after push event - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:205 @ 04/19/26 14:01:24.254 (12ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.255&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:24.255 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when An snapshot of push event is created checks if all of the integrationPipelineRuns created by push event passed [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="passed" time="20.082750002">
              <system-err>&gt; Enter [It] checks if all of the integrationPipelineRuns created by push event passed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:218 @ 04/19/26 14:01:24.255&#xA;Integration test scenario my-integration-test-rlko is found&#xA;PipelineRun my-integration-test-rlko-bqpk9 reason: &#xA;PipelineRun my-integration-test-rlko-bqpk9 reason: Succeeded&#xA;&lt; Exit [It] checks if all of the integrationPipelineRuns created by push event passed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:218 @ 04/19/26 14:01:44.338 (20.082s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:44.338&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:44.338 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when An snapshot of push event is created checks if a Release is created successfully [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="3.347476794">
              <system-err>&gt; Enter [It] checks if a Release is created successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:222 @ 04/19/26 14:01:44.338&#xA;&lt; Exit [It] checks if a Release is created successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:222 @ 04/19/26 14:01:44.346 (7ms)&#xA;&gt; Enter [AfterAll] with happy path for general flow of Integration service - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:68 @ 04/19/26 14:01:44.346&#xA;&lt; Exit [AfterAll] with happy path for general flow of Integration service - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:68 @ 04/19/26 14:01:47.685 (3.34s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:47.686&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:01:47.686 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail triggers a build PipelineRun [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="312.807851594">
              <system-err>&gt; Enter [BeforeAll] with an integration test fail - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:234 @ 04/19/26 14:01:47.686&#xA;&lt; Exit [BeforeAll] with an integration test fail - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:234 @ 04/19/26 14:02:00.389 (12.702s)&#xA;&gt; Enter [It] triggers a build PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:266 @ 04/19/26 14:02:00.389&#xA;no pipelinerun found for component test-component-pac-aztgyh (application: integ-app-aikj, namespace: integration2-wnik)PipelineRun test-component-pac-aztgyh-on-pull-request-s4mf4 found for Component integration2-wnik/test-component-pac-aztgyh&#xA;PipelineRun test-component-pac-aztgyh-on-pull-request-s4mf4 reason: ResolvingTaskRef&#xA;PipelineRun test-component-pac-aztgyh-on-pull-request-s4mf4 reason: Running&#xA;PipelineRun test-component-pac-aztgyh-on-pull-request-s4mf4 reason: Running&#xA;PipelineRun test-component-pac-aztgyh-on-pull-request-s4mf4 reason: Running&#xA;PipelineRun test-component-pac-aztgyh-on-pull-request-s4mf4 reason: Running&#xA;PipelineRun test-component-pac-aztgyh-on-pull-request-s4mf4 reason: Running&#xA;PipelineRun test-component-pac-aztgyh-on-pull-request-s4mf4 reason: Running&#xA;PipelineRun test-component-pac-aztgyh-on-pull-request-s4mf4 reason: Running&#xA;PipelineRun test-component-pac-aztgyh-on-pull-request-s4mf4 reason: Running&#xA;PipelineRun test-component-pac-aztgyh-on-pull-request-s4mf4 reason: Running&#xA;PipelineRun test-component-pac-aztgyh-on-pull-request-s4mf4 reason: Running&#xA;PipelineRun test-component-pac-aztgyh-on-pull-request-s4mf4 reason: Running&#xA;PipelineRun test-component-pac-aztgyh-on-pull-request-s4mf4 reason: Running&#xA;PipelineRun my-integration-test-yoai-tnqqf reason: Running&#xA;PipelineRun my-integration-test-yoai-tnqqf reason: Succeeded&#xA;&lt; Exit [It] triggers a build PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:266 @ 04/19/26 14:07:00.494 (5m0.105s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.494&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.494 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail should have a related PaC init PR created [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.248885973">
              <system-err>&gt; Enter [It] should have a related PaC init PR created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:273 @ 04/19/26 14:07:00.495&#xA;&lt; Exit [It] should have a related PaC init PR created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:273 @ 04/19/26 14:07:00.743 (248ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.743&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.743 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the BuildPipelineRun have the annotation of chains signed [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.016789185">
              <system-err>&gt; Enter [It] checks if the BuildPipelineRun have the annotation of chains signed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:292 @ 04/19/26 14:07:00.744&#xA;&lt; Exit [It] checks if the BuildPipelineRun have the annotation of chains signed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:292 @ 04/19/26 14:07:00.76 (16ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.76&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.761 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the Snapshot is created [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007374238">
              <system-err>&gt; Enter [It] checks if the Snapshot is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:296 @ 04/19/26 14:07:00.761&#xA;&lt; Exit [It] checks if the Snapshot is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:296 @ 04/19/26 14:07:00.768 (7ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.768&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.768 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the Build PipelineRun got annotated with Snapshot name [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.017829354">
              <system-err>&gt; Enter [It] checks if the Build PipelineRun got annotated with Snapshot name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:301 @ 04/19/26 14:07:00.769&#xA;&lt; Exit [It] checks if the Build PipelineRun got annotated with Snapshot name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:301 @ 04/19/26 14:07:00.786 (17ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.786&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.786 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if all of the integrationPipelineRuns finished [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="passed" time="0.012756289">
              <system-err>&gt; Enter [It] checks if all of the integrationPipelineRuns finished - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:305 @ 04/19/26 14:07:00.787&#xA;Integration test scenario my-integration-test-yoai is found&#xA;PipelineRun my-integration-test-yoai-tnqqf reason: Succeeded&#xA;&lt; Exit [It] checks if all of the integrationPipelineRuns finished - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:305 @ 04/19/26 14:07:00.799 (12ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.8&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.8 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the failed status of integration test is reported in the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.009752143">
              <system-err>&gt; Enter [It] checks if the failed status of integration test is reported in the Snapshot - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:309 @ 04/19/26 14:07:00.8&#xA;&lt; Exit [It] checks if the failed status of integration test is reported in the Snapshot - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:309 @ 04/19/26 14:07:00.81 (9ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.81&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.81 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the skipped integration test is absent from the Snapshot&#39;s status annotation [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007794506">
              <system-err>&gt; Enter [It] checks if the skipped integration test is absent from the Snapshot&#39;s status annotation - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:324 @ 04/19/26 14:07:00.81&#xA;&lt; Exit [It] checks if the skipped integration test is absent from the Snapshot&#39;s status annotation - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:324 @ 04/19/26 14:07:00.818 (7ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.818&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.818 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if snapshot is marked as failed [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007394879">
              <system-err>&gt; Enter [It] checks if snapshot is marked as failed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:334 @ 04/19/26 14:07:00.819&#xA;&lt; Exit [It] checks if snapshot is marked as failed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:334 @ 04/19/26 14:07:00.826 (7ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.826&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.826 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the finalizer was removed from all of the related Integration pipelineRuns [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.075712209">
              <system-err>&gt; Enter [It] checks if the finalizer was removed from all of the related Integration pipelineRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:340 @ 04/19/26 14:07:00.826&#xA;Integration test scenario my-integration-test-yoai is found&#xA;&lt; Exit [It] checks if the finalizer was removed from all of the related Integration pipelineRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:340 @ 04/19/26 14:07:00.902 (75ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.902&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.902 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail creates a new IntegrationTestScenario [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.066240041">
              <system-err>&gt; Enter [It] creates a new IntegrationTestScenario - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:344 @ 04/19/26 14:07:00.903&#xA;&lt; Exit [It] creates a new IntegrationTestScenario - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:344 @ 04/19/26 14:07:00.968 (66ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.969&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.969 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail updates the Snapshot with the re-run label for the new scenario [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.028977653">
              <system-err>&gt; Enter [It] updates the Snapshot with the re-run label for the new scenario - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:349 @ 04/19/26 14:07:00.969&#xA;&lt; Exit [It] updates the Snapshot with the re-run label for the new scenario - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:349 @ 04/19/26 14:07:00.998 (29ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.998&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:00.998 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if the new integration pipelineRun started [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="passed" time="20.033847203">
              <system-err>&gt; Enter [It] checks if the new integration pipelineRun started - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:358 @ 04/19/26 14:07:00.999&#xA;PipelineRun has not been created yet for test scenario %s and snapshot %s/%s my-integration-test-zxmc integration2-wnik integ-app-aikj-20260419-140208-000&#xA;&lt; Exit [It] checks if the new integration pipelineRun started - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:358 @ 04/19/26 14:07:21.032 (20.034s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:21.032&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:21.032 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if the re-run label was removed from the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007260818">
              <system-err>&gt; Enter [It] checks if the re-run label was removed from the Snapshot - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:364 @ 04/19/26 14:07:21.033&#xA;&lt; Exit [It] checks if the re-run label was removed from the Snapshot - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:364 @ 04/19/26 14:07:21.04 (7ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:21.04&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:21.04 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if all integration pipelineRuns finished successfully [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="passed" time="0.020128772">
              <system-err>&gt; Enter [It] checks if all integration pipelineRuns finished successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:378 @ 04/19/26 14:07:21.04&#xA;Integration test scenario my-integration-test-yoai is found&#xA;PipelineRun my-integration-test-yoai-tnqqf reason: Succeeded&#xA;Integration test scenario my-integration-test-zxmc is found&#xA;PipelineRun my-integration-test-zxmc-slfrw reason: Succeeded&#xA;&lt; Exit [It] checks if all integration pipelineRuns finished successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:378 @ 04/19/26 14:07:21.06 (20ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:21.06&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:21.06 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if the name of the re-triggered pipelinerun is reported in the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.065497729">
              <system-err>&gt; Enter [It] checks if the name of the re-triggered pipelinerun is reported in the Snapshot - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:382 @ 04/19/26 14:07:21.061&#xA;&lt; Exit [It] checks if the name of the re-triggered pipelinerun is reported in the Snapshot - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:382 @ 04/19/26 14:07:21.126 (65ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:21.126&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:21.126 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if snapshot is still marked as failed [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007520282">
              <system-err>&gt; Enter [It] checks if snapshot is still marked as failed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:399 @ 04/19/26 14:07:21.126&#xA;&lt; Exit [It] checks if snapshot is still marked as failed - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:399 @ 04/19/26 14:07:21.134 (7ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:21.134&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:21.134 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail creates an snapshot of push event [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="0.026174045">
              <system-err>&gt; Enter [It] creates an snapshot of push event - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:406 @ 04/19/26 14:07:21.134&#xA;&lt; Exit [It] creates an snapshot of push event - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:406 @ 04/19/26 14:07:21.16 (26ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:21.16&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:21.16 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot of push event is created checks no Release CRs are created [integration-service]" classname="Red Hat App Studio E2E tests" status="passed" time="4.099638785">
              <system-err>&gt; Enter [It] checks no Release CRs are created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:413 @ 04/19/26 14:07:21.161&#xA;&lt; Exit [It] checks no Release CRs are created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:413 @ 04/19/26 14:07:21.168 (7ms)&#xA;&gt; Enter [AfterAll] with an integration test fail - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:250 @ 04/19/26 14:07:21.168&#xA;&lt; Exit [AfterAll] with an integration test fail - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:250 @ 04/19/26 14:07:25.26 (4.092s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:25.26&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/integration.go:49 @ 04/19/26 14:07:25.26 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies if the release CR is created [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies the rhio release pipelinerun is running and succeeds [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies if the MR URL is valid [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [upgrade-suite Create users and check their state] Verify AppStudioProvisionedUser [upgrade-verify]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [upgrade-suite Create users and check their state] creates AppStudioDeactivatedUser [upgrade-verify]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [upgrade-suite Create users and check their state] creates AppStudioBannedUser [upgrade-verify]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies if the release CR is created [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies the rhtap release pipelinerun is running and succeeds [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies if the PR in infra-deployments repo is created/updated [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace creates component with context directory go-component [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="44.900665958">
              <system-err>&gt; Enter [BeforeAll] test pac with multiple components using same repository - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:40 @ 04/19/26 13:50:24.373&#xA;&lt; Exit [BeforeAll] test pac with multiple components using same repository - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:40 @ 04/19/26 13:50:28.998 (4.625s)&#xA;&gt; Enter [It] creates component with context directory go-component - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:106 @ 04/19/26 13:50:28.998&#xA;Image repository for component go-component-rlpywd in namespace build-e2e-wtjb do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component go-component-rlpywd in namespace build-e2e-wtjb do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component go-component-rlpywd in namespace build-e2e-wtjb do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates component with context directory go-component - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:106 @ 04/19/26 13:51:09.274 (40.275s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 13:51:09.274&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 13:51:09.274 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace triggers a PipelineRun for component go-component-rlpywd [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="80.065766988">
              <system-err>&gt; Enter [It] triggers a PipelineRun for component go-component-rlpywd - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:125 @ 04/19/26 13:51:09.274&#xA;PipelineRun has not been created yet for the component build-e2e-wtjb/go-component-rlpywd&#xA;PipelineRun has not been created yet for the component build-e2e-wtjb/go-component-rlpywd&#xA;PipelineRun has not been created yet for the component build-e2e-wtjb/go-component-rlpywd&#xA;PipelineRun has not been created yet for the component build-e2e-wtjb/go-component-rlpywd&#xA;&lt; Exit [It] triggers a PipelineRun for component go-component-rlpywd - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:125 @ 04/19/26 13:52:29.34 (1m20.065s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 13:52:29.34&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 13:52:29.34 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace should lead to a PaC PR creation for component go-component-rlpywd [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="0.373897955">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for component go-component-rlpywd - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:140 @ 04/19/26 13:52:29.341&#xA;&lt; Exit [It] should lead to a PaC PR creation for component go-component-rlpywd - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:140 @ 04/19/26 13:52:29.714 (374ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 13:52:29.714&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 13:52:29.714 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace the PipelineRun should eventually finish successfully for component go-component-rlpywd [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="500.022073506">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for component go-component-rlpywd - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:159 @ 04/19/26 13:52:29.715&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 found for Component build-e2e-wtjb/go-component-rlpywd&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Running&#xA;PipelineRun go-component-rlpywd-on-pull-request-4bgs8 reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for component go-component-rlpywd - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:159 @ 04/19/26 14:00:49.736 (8m20.022s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:00:49.737&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:00:49.737 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace merging the PR should be successful [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="1.628443517">
              <system-err>&gt; Enter [It] merging the PR should be successful - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:164 @ 04/19/26 14:00:49.737&#xA;merged result sha: 64cb2bed56e4dedee4e8b7c0aa9f71fb6cb7726c for PR #32444&#xA;&lt; Exit [It] merging the PR should be successful - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:164 @ 04/19/26 14:00:51.365 (1.628s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:00:51.366&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:00:51.366 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="20.024203463">
              <system-err>&gt; Enter [It] leads to triggering on push PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:174 @ 04/19/26 14:00:51.366&#xA;Push PipelineRun has not been created yet for the component build-e2e-wtjb/go-component-rlpywd&#xA;&lt; Exit [It] leads to triggering on push PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:174 @ 04/19/26 14:01:11.39 (20.024s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:01:11.39&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:01:11.39 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace creates component with context directory python-component [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="10.054521093">
              <system-err>&gt; Enter [It] creates component with context directory python-component - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:106 @ 04/19/26 14:01:11.391&#xA;&lt; Exit [It] creates component with context directory python-component - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:106 @ 04/19/26 14:01:21.445 (10.054s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:01:21.445&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:01:21.445 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace triggers a PipelineRun for component python-component-ioyxjl [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="20.019615049">
              <system-err>&gt; Enter [It] triggers a PipelineRun for component python-component-ioyxjl - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:125 @ 04/19/26 14:01:21.446&#xA;PipelineRun has not been created yet for the component build-e2e-wtjb/python-component-ioyxjl&#xA;&lt; Exit [It] triggers a PipelineRun for component python-component-ioyxjl - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:125 @ 04/19/26 14:01:41.465 (20.019s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:01:41.465&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:01:41.465 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace should lead to a PaC PR creation for component python-component-ioyxjl [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="0.306118667">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for component python-component-ioyxjl - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:140 @ 04/19/26 14:01:41.466&#xA;&lt; Exit [It] should lead to a PaC PR creation for component python-component-ioyxjl - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:140 @ 04/19/26 14:01:41.771 (306ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:01:41.772&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:01:41.772 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace the PipelineRun should eventually finish successfully for component python-component-ioyxjl [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="320.019110206">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for component python-component-ioyxjl - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:159 @ 04/19/26 14:01:41.772&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 found for Component build-e2e-wtjb/python-component-ioyxjl&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 reason: Running&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 reason: Running&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 reason: Running&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 reason: Running&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 reason: Running&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 reason: Running&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 reason: Running&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 reason: Running&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 reason: Running&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 reason: Running&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 reason: Running&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 reason: Running&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 reason: Running&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 reason: Running&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 reason: Running&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 reason: Running&#xA;PipelineRun python-component-ioyxjl-on-pull-request-9gxj5 reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for component python-component-ioyxjl - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:159 @ 04/19/26 14:07:01.791 (5m20.019s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:07:01.791&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:07:01.791 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace merging the PR should be successful [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="1.5934837750000002">
              <system-err>&gt; Enter [It] merging the PR should be successful - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:164 @ 04/19/26 14:07:01.792&#xA;merged result sha: dce24a3a7721f8144f201e13dd35786b8f9538ea for PR #32445&#xA;&lt; Exit [It] merging the PR should be successful - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:164 @ 04/19/26 14:07:03.385 (1.593s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:07:03.385&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:07:03.385 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="20.086672837">
              <system-err>&gt; Enter [It] leads to triggering on push PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:174 @ 04/19/26 14:07:03.385&#xA;Push PipelineRun has not been created yet for the component build-e2e-wtjb/python-component-ioyxjl&#xA;&lt; Exit [It] leads to triggering on push PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:174 @ 04/19/26 14:07:23.472 (20.086s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:07:23.472&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:07:23.472 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace only one component is changed [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="2.65837527">
              <system-err>&gt; Enter [It] only one component is changed - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:190 @ 04/19/26 14:07:23.472&#xA;PR #32446 got created with sha 80bfb42555fec4d2a6a785b366037a29c6c47f8e&#xA;&lt; Exit [It] only one component is changed - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:190 @ 04/19/26 14:07:26.13 (2.658s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:07:26.131&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:07:26.131 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace only related pipelinerun should be triggered [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="20.021437917">
              <system-err>&gt; Enter [It] only related pipelinerun should be triggered - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:205 @ 04/19/26 14:07:26.131&#xA;on pull PiplelineRun has not been created yet for the PR&#xA;&lt; Exit [It] only related pipelinerun should be triggered - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:205 @ 04/19/26 14:07:46.152 (20.021s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:07:46.153&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:07:46.153 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when a components is created with same git url in different namespace should fail to configure PaC for the component [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="17.810433617">
              <system-err>&gt; Enter [BeforeAll] when a components is created with same git url in different namespace - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:223 @ 04/19/26 14:07:46.153&#xA;&lt; Exit [BeforeAll] when a components is created with same git url in different namespace - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:223 @ 04/19/26 14:07:57.867 (11.714s)&#xA;&gt; Enter [It] should fail to configure PaC for the component - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:264 @ 04/19/26 14:07:57.868&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;error&#34;,&#34;error-id&#34;:53,&#34;error-message&#34;:&#34;53: Git repository is already handled by Pipelines as Code&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;build status: &amp;{State:error MergeUrl: ConfigurationTime: ErrorInfo:{ErrId:53 ErrMessage:53: Git repository is already handled by Pipelines as Code}}&#xA;&lt; Exit [It] should fail to configure PaC for the component - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:264 @ 04/19/26 14:07:57.875 (8ms)&#xA;&gt; Enter [AfterAll] when a components is created with same git url in different namespace - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:253 @ 04/19/26 14:07:57.875&#xA;&lt; Exit [AfterAll] when a components is created with same git url in different namespace - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:253 @ 04/19/26 14:07:57.997 (122ms)&#xA;&gt; Enter [AfterAll] test pac with multiple components using same repository - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:68 @ 04/19/26 14:07:57.997&#xA;&lt; Exit [AfterAll] test pac with multiple components using same repository - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:68 @ 04/19/26 14:08:03.963 (5.966s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:08:03.963&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/multi_component.go:28 @ 04/19/26 14:08:03.963 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies the release CR is created [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies the multiarch release pipelinerun is running and succeeds [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies if the repository URL is valid [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines triggers PipelineRun for symlink component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-fbve [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="153.600885381">
              <system-err>&gt; Enter [BeforeAll] HACBS pipelines - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:237 @ 04/19/26 13:50:24.372&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;found credentials for image ref quay.io/redhat-appstudio-qe/test-images:pipeline-bundle-1776606630-gpyr -&gt; user: redhat-appstudio-qe+redhat_appstudio_quality&#34;&#xA;Image repository for component test-comp-iwsw in namespace build-e2e-kzwe do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component test-comp-iwsw in namespace build-e2e-kzwe do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component test-comp-iwsw in namespace build-e2e-kzwe do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Created component for scenario sample-python-basic-oci: component: test-comp-iwsw, repo: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic, baseBranchName: base-kubfzl, pacBranchName: konflux-test-comp-iwsw&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;found credentials for image ref quay.io/redhat-appstudio-qe/test-images:pipeline-bundle-1776606672-meot -&gt; user: redhat-appstudio-qe+redhat_appstudio_quality&#34;&#xA;Image repository for component test-comp-yssu in namespace build-e2e-kzwe do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component test-comp-yssu in namespace build-e2e-kzwe do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Created component for scenario sample-python-basic-oci: component: test-comp-yssu, repo: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic, baseBranchName: base-zzyuef, pacBranchName: konflux-test-comp-yssu&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;found credentials for image ref quay.io/redhat-appstudio-qe/test-images:pipeline-bundle-1776606705-incg -&gt; user: redhat-appstudio-qe+redhat_appstudio_quality&#34;&#xA;Image repository for component test-comp-lskn in namespace build-e2e-kzwe do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Created component for scenario sample-python-basic-oci: component: test-comp-lskn, repo: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic, baseBranchName: base-qildeb, pacBranchName: konflux-test-comp-lskn&#xA;Created component for scenario sample-python-basic-oci: component: test-symlink-comp-fbve, repo: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic, baseBranchName: base-jgidmp, pacBranchName: konflux-test-symlink-comp-fbve&#xA;&lt; Exit [BeforeAll] HACBS pipelines - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:237 @ 04/19/26 13:52:17.735 (1m53.363s)&#xA;&gt; Enter [It] triggers PipelineRun for symlink component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-fbve - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:325 @ 04/19/26 13:52:17.736&#xA;PipelineRun has not been created yet for Component build-e2e-kzwe/test-symlink-comp-fbve&#xA;PipelineRun has not been created yet for Component build-e2e-kzwe/test-symlink-comp-fbve&#xA;&lt; Exit [It] triggers PipelineRun for symlink component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-fbve - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:325 @ 04/19/26 13:52:57.973 (40.237s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 13:52:57.973&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 13:52:57.973 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.083968746">
              <system-err>&gt; Enter [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:338 @ 04/19/26 13:52:57.974&#xA;&lt; Exit [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:338 @ 04/19/26 13:52:58.057 (84ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 13:52:58.057&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 13:52:58.057 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.098720063">
              <system-err>&gt; Enter [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:338 @ 04/19/26 13:52:58.058&#xA;&lt; Exit [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:338 @ 04/19/26 13:52:58.156 (98ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 13:52:58.156&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 13:52:58.156 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.0915845">
              <system-err>&gt; Enter [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:338 @ 04/19/26 13:52:58.157&#xA;&lt; Exit [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:338 @ 04/19/26 13:52:58.248 (91ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 13:52:58.248&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 13:52:58.248 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="520.03032956">
              <system-err>&gt; Enter [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:356 @ 04/19/26 13:52:58.249&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r found for Component build-e2e-kzwe/test-comp-lskn&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Running&#xA;PipelineRun test-comp-lskn-on-pull-request-6vp5r reason: Succeeded&#xA;&lt; Exit [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:356 @ 04/19/26 14:01:38.279 (8m40.03s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:01:38.279&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:01:38.279 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) should push Dockerfile to registry [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.000364467">
              <skipped message="skipped - Skipping DockerBuildOciTAMin build, which does not push Dockerfile to registry"></skipped>
              <system-err>&gt; Enter [It] should push Dockerfile to registry - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:366 @ 04/19/26 14:01:38.28&#xA;[SKIPPED] Skipping DockerBuildOciTAMin build, which does not push Dockerfile to registry&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:369 @ 04/19/26 14:01:38.28&#xA;&lt; Exit [It] should push Dockerfile to registry - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:366 @ 04/19/26 14:01:38.28 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:01:38.28&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:01:38.28 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) floating tags are created successfully [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.000279035">
              <skipped message="skipped - floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic"></skipped>
              <system-err>&gt; Enter [It] floating tags are created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:378 @ 04/19/26 14:01:38.28&#xA;[SKIPPED] floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:380 @ 04/19/26 14:01:38.28&#xA;&lt; Exit [It] floating tags are created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:378 @ 04/19/26 14:01:38.28 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:01:38.28&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:01:38.28 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) image manifest mediaType is correct [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.344108864">
              <system-err>&gt; Enter [It] image manifest mediaType is correct - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:395 @ 04/19/26 14:01:38.281&#xA;&lt; Exit [It] image manifest mediaType is correct - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:395 @ 04/19/26 14:01:38.624 (344ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:01:38.625&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:01:38.625 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) check for source images if enabled in pipeline [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.013235786">
              <skipped message="skipped - Skiping DockerBuildOciTAMin build test-comp-lskn-on-pull-request-6vp5r"></skipped>
              <system-err>&gt; Enter [It] check for source images if enabled in pipeline - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:420 @ 04/19/26 14:01:38.625&#xA;This is DockerBuildOciTAMin build, which does not require source container build.&#xA;[SKIPPED] Skiping DockerBuildOciTAMin build test-comp-lskn-on-pull-request-6vp5r&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:433 @ 04/19/26 14:01:38.638&#xA;&lt; Exit [It] check for source images if enabled in pipeline - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:420 @ 04/19/26 14:01:38.638 (13ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:01:38.638&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:01:38.638 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min should have Pipeline Records [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="0.215709138">
              <system-err>&gt; Enter [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:477 @ 04/19/26 14:01:38.639&#xA;&lt; Exit [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:477 @ 04/19/26 14:01:38.738 (99ms)&#xA;&gt; Enter [It] should have Pipeline Records - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:498 @ 04/19/26 14:01:38.738&#xA;records for PipelineRun test-comp-lskn-on-pull-request-6vp5r:&#xA;&amp;{[{build-e2e-kzwe/results/b599ba39-f6b4-4448-832d-a8b64e99e8e3/records/adf72067-289e-483d-ac2e-ab5c88f9f3ec 0aaa3c3e-cbde-483d-b5ad-6908f19a01d8 0aaa3c3e-cbde-483d-b5ad-6908f19a01d8} {build-e2e-kzwe/results/b599ba39-f6b4-4448-832d-a8b64e99e8e3/records/93089984-1ff9-4236-8f0b-b478c4806919 3413539e-da90-4c5b-affe-aedd92d4f88e 3413539e-da90-4c5b-affe-aedd92d4f88e} {build-e2e-kzwe/results/b599ba39-f6b4-4448-832d-a8b64e99e8e3/records/2f7df007-8020-4d63-bc75-c1a7c5ca3f35 4398becf-1b74-4008-b21e-9176256b7c0d 4398becf-1b74-4008-b21e-9176256b7c0d} {build-e2e-kzwe/results/b599ba39-f6b4-4448-832d-a8b64e99e8e3/records/07e5d634-cc74-405b-867b-ad962bfd58b0 5321e3a5-13e2-4396-90b3-7ca51af3328e 5321e3a5-13e2-4396-90b3-7ca51af3328e} {build-e2e-kzwe/results/b599ba39-f6b4-4448-832d-a8b64e99e8e3/records/be57db25-5995-4a40-bdc0-46954133e963 55c52d23-d6bc-412b-9f34-54ab47f1ef45 55c52d23-d6bc-412b-9f34-54ab47f1ef45} {build-e2e-kzwe/results/b599ba39-f6b4-4448-832d-a8b64e99e8e3/records/011bf613-b358-4d62-b4a1-702c2564293b 5923ef46-43df-41a6-843a-3a283a4998b4 5923ef46-43df-41a6-843a-3a283a4998b4} {build-e2e-kzwe/results/b599ba39-f6b4-4448-832d-a8b64e99e8e3/records/d50f39fd-6233-475a-898f-7f3968e2104d 87b50412-b7c4-4371-8509-2f4824b163a9 87b50412-b7c4-4371-8509-2f4824b163a9} {build-e2e-kzwe/results/b599ba39-f6b4-4448-832d-a8b64e99e8e3/records/776658d4-5533-4a92-b9f8-b679e37736ae da819d30-96cf-4330-986a-eac04850db2d da819d30-96cf-4330-986a-eac04850db2d} {build-e2e-kzwe/results/b599ba39-f6b4-4448-832d-a8b64e99e8e3/records/0b8edf28-f1f8-4a2c-b293-52b9d1c2acf5 eef95652-5957-4a4b-aad4-bd1039fc6b0b eef95652-5957-4a4b-aad4-bd1039fc6b0b} {build-e2e-kzwe/results/b599ba39-f6b4-4448-832d-a8b64e99e8e3/records/d877b2df-442a-4a75-8b1c-f2444ed1d64f f06b6b2e-8c38-49c9-bc2d-acefdb6df617 f06b6b2e-8c38-49c9-bc2d-acefdb6df617}]}&#xA;&lt; Exit [It] should have Pipeline Records - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:498 @ 04/19/26 14:01:38.854 (116ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:01:38.854&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:01:38.854 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min should have Pipeline Logs [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.031275761">
              <system-err>&gt; Enter [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:540 @ 04/19/26 14:01:38.855&#xA;&lt; Exit [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:540 @ 04/19/26 14:01:38.886 (31ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:01:38.886&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:01:38.886 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry verify-enterprise-contract check should pass [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry should have Hermeto content in the SBOM in case the build was hermetic [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.01023512">
              <skipped message="skipped - Hermetic build is not enabled, skipping the test"></skipped>
              <system-err>&gt; Enter [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:550 @ 04/19/26 14:01:38.887&#xA;&lt; Exit [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:550 @ 04/19/26 14:01:38.896 (10ms)&#xA;&gt; Enter [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:661 @ 04/19/26 14:01:38.896&#xA;[SKIPPED] Hermetic build is not enabled, skipping the test&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:663 @ 04/19/26 14:01:38.897&#xA;&lt; Exit [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:661 @ 04/19/26 14:01:38.897 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:01:38.897&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:01:38.897 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) build-definitions ec pipelines runs ec pipeline pipelines/enterprise-contract.yaml [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="196.762094076">
              <system-err>&gt; Enter [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:356 @ 04/19/26 14:01:38.897&#xA;PipelineRun test-comp-iwsw-on-pull-request-cqm7h found for Component build-e2e-kzwe/test-comp-iwsw&#xA;PipelineRun test-comp-iwsw-on-pull-request-cqm7h reason: Failed&#xA;attempt 1/3: PipelineRun &#34;test-comp-iwsw-on-pull-request-cqm7h&#34; failed: &#xA; pod: test-comp-iwsw-on-pull-requ54bccf7c5d7974d43404e79366fafcb9-pod | init container: prepare&#xA;2026/04/19 13:54:50 Entrypoint initialization&#xA;&#xA; pod: test-comp-iwsw-on-pull-requ54bccf7c5d7974d43404e79366fafcb9-pod | init container: place-scripts&#xA;2026/04/19 13:54:51 Decoded script /tekton/scripts/script-0-nxkvr&#xA;2026/04/19 13:54:51 Decoded script /tekton/scripts/script-1-zkwr4&#xA;2026/04/19 13:54:51 Decoded script /tekton/scripts/script-2-ztl7r&#xA;2026/04/19 13:54:51 Decoded script /tekton/scripts/script-3-kcb2t&#xA;2026/04/19 13:54:51 Decoded script /tekton/scripts/script-4-shhxd&#xA;2026/04/19 13:54:51 Decoded script /tekton/scripts/script-5-knjv9&#xA;&#xA;pod: test-comp-iwsw-on-pull-requ54bccf7c5d7974d43404e79366fafcb9-pod | container step-introspect: &#xA;Artifact type will be determined by introspection.&#xA;Checking the media type of the OCI artifact...&#xA;[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#xA;The media type of the OCI artifact is application/vnd.oci.image.manifest.v1+json.&#xA;Looking for image labels that indicate this might be an operator bundle...&#xA;[retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#xA;Found 0 matching labels.&#xA;Expecting 3 or more to identify this image as an operator bundle.&#xA;Introspection concludes that this artifact is of type &#34;application&#34;.&#xA;&#xA;pod: test-comp-iwsw-on-pull-requ54bccf7c5d7974d43404e79366fafcb9-pod | container step-generate-container-auth: &#xA;Selecting auth for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw&#xA;Auth json written to &#34;/auth/auth.json&#34;.&#xA;&#xA;pod: test-comp-iwsw-on-pull-requ54bccf7c5d7974d43404e79366fafcb9-pod | container step-set-skip-for-bundles: &#xA;2026/04/19 13:56:50 INFO Step was skipped due to when expressions were evaluated to false.&#xA;&#xA;pod: test-comp-iwsw-on-pull-requ54bccf7c5d7974d43404e79366fafcb9-pod | container step-app-check: &#xA;time=&#34;2026-04-19T13:56:51Z&#34; level=info msg=&#34;certification library version&#34; version=&#34;1.17.1 &lt;commit: f7de82ae1c76e6c10ea94967d6b6a66f96248cbe&gt;&#34;&#xA;time=&#34;2026-04-19T13:56:51Z&#34; level=info msg=&#34;running checks for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e for platform amd64&#34;&#xA;time=&#34;2026-04-19T13:56:51Z&#34; level=info msg=&#34;target image&#34; image=&#34;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#34;&#xA;time=&#34;2026-04-19T13:56:56Z&#34; level=error msg=&#34;could not get rpm list, continuing without it&#34; error=&#34;could not find rpm db/packages: stat /tmp/preflight-2698635784/fs/usr/lib/sysimage/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-2698635784/fs/var/lib/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-2698635784/fs/var/lib/rpm/Packages: no such file or directory&#34;&#xA;time=&#34;2026-04-19T13:56:56Z&#34; level=info msg=&#34;warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-2698635784/fs/licenses: no such file or directory&#34; check=HasLicense&#xA;time=&#34;2026-04-19T13:56:56Z&#34; level=info msg=&#34;check completed&#34; check=HasLicense result=FAILED&#xA;time=&#34;2026-04-19T13:56:56Z&#34; level=info msg=&#34;check completed&#34; check=HasUniqueTag result=PASSED&#xA;time=&#34;2026-04-19T13:56:56Z&#34; level=info msg=&#34;check completed&#34; check=LayerCountAcceptable result=PASSED&#xA;time=&#34;2026-04-19T13:56:56Z&#34; level=info msg=&#34;check completed&#34; check=HasNoProhibitedPackages err=&#34;unable to get a list of all packages in the image: could not get rpm list: could not find rpm db/packages: stat /tmp/preflight-2698635784/fs/usr/lib/sysimage/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-2698635784/fs/var/lib/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-2698635784/fs/var/lib/rpm/Packages: no such file or directory&#34; result=ERROR&#xA;time=&#34;2026-04-19T13:56:56Z&#34; level=info msg=&#34;check completed&#34; check=HasRequiredLabel result=FAILED&#xA;time=&#34;2026-04-19T13:56:56Z&#34; level=info msg=&#34;detected empty USER. Presumed to be running as root&#34; check=RunAsNonRoot&#xA;time=&#34;2026-04-19T13:56:56Z&#34; level=info msg=&#34;USER value must be provided and be a non-root value for this check to pass&#34; check=RunAsNonRoot&#xA;time=&#34;2026-04-19T13:56:56Z&#34; level=info msg=&#34;check completed&#34; check=RunAsNonRoot result=FAILED&#xA;time=&#34;2026-04-19T13:57:01Z&#34; level=info msg=&#34;check completed&#34; check=HasModifiedFiles result=PASSED&#xA;time=&#34;2026-04-19T13:57:01Z&#34; level=info msg=&#34;check completed&#34; check=BasedOnUbi result=FAILED&#xA;time=&#34;2026-04-19T13:57:01Z&#34; level=info msg=&#34;This image&#39;s tag on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e will be paired with digest sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.&#34;&#xA;{&#xA;    &#34;image&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#34;,&#xA;    &#34;passed&#34;: false,&#xA;    &#34;test_library&#34;: {&#xA;        &#34;name&#34;: &#34;github.com/redhat-openshift-ecosystem/openshift-preflight&#34;,&#xA;        &#34;version&#34;: &#34;1.17.1&#34;,&#xA;        &#34;commit&#34;: &#34;f7de82ae1c76e6c10ea94967d6b6a66f96248cbe&#34;&#xA;    },&#xA;    &#34;results&#34;: {&#xA;        &#34;passed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasUniqueTag&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has a tag other than &#39;latest&#39;, so that the image can be uniquely identified.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;LayerCountAcceptable&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasModifiedFiles&#34;,&#xA;                &#34;elapsed_time&#34;: 4426,&#xA;                &#34;description&#34;: &#34;Checks that no files installed via RPM in the base Red Hat layer have been modified&#34;&#xA;            }&#xA;        ],&#xA;        &#34;failed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasLicense&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses&#34;,&#xA;                &#34;help&#34;: &#34;Check HasLicense encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasRequiredLabel&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata&#34;,&#xA;                &#34;help&#34;: &#34;Check HasRequiredLabel encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Add the following labels to your Dockerfile or Containerfile: name, vendor, version, release, summary, description, maintainer.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;RunAsNonRoot&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication&#34;,&#xA;                &#34;help&#34;: &#34;Check RunAsNonRoot encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Indicate a specific USER in the dockerfile or containerfile&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;BasedOnUbi&#34;,&#xA;                &#34;elapsed_time&#34;: 404,&#xA;                &#34;description&#34;: &#34;Checking if the container&#39;s base image is based upon the Red Hat Universal Base Image (UBI)&#34;,&#xA;                &#34;help&#34;: &#34;Check BasedOnUbi encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Change the FROM directive in your Dockerfile or Containerfile, for the latest list of images and details refer to: https://catalog.redhat.com/software/base-images&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            }&#xA;        ],&#xA;        &#34;errors&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasNoProhibitedPackages&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.&#34;,&#xA;                &#34;help&#34;: &#34;Check HasNoProhibitedPackages encountered an error. Please review the preflight.log file for more information.&#34;&#xA;            }&#xA;        ]&#xA;    }&#xA;}&#xA;time=&#34;2026-04-19T13:57:01Z&#34; level=info msg=&#34;Preflight result: FAILED&#34;&#xA;&#xA;pod: test-comp-iwsw-on-pull-requ54bccf7c5d7974d43404e79366fafcb9-pod | container step-app-set-outcome: &#xA;{&#34;result&#34;:&#34;ERROR&#34;,&#34;timestamp&#34;:&#34;1776607021&#34;,&#34;note&#34;:&#34;Task preflight is a ERROR: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:3,&#34;failures&#34;:4,&#34;warnings&#34;:0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#xA;&#xA;pod: test-comp-iwsw-on-pull-requ54bccf7c5d7974d43404e79366fafcb9-pod | container step-final-outcome: &#xA;+ [[ ! -f /mount/konflux.results.json ]]&#xA;+ tee /tekton/steps/step-final-outcome/results/test-output&#xA;{&#34;result&#34;:&#34;ERROR&#34;,&#34;timestamp&#34;:&#34;1776607021&#34;,&#34;note&#34;:&#34;Task preflight is a ERROR: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:3,&#34;failures&#34;:4,&#34;warnings&#34;:0}&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-apply-tags-pod | init container: prepare&#xA;2026/04/19 13:54:50 Entrypoint initialization&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-apply-tags-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-04-19T13:54:53Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#34;&#xA;time=&#34;2026-04-19T13:54:53Z&#34; level=info msg=&#34;[param] digest: sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6&#34;&#xA;time=&#34;2026-04-19T13:54:53Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-04-19T13:54:54Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-build-container-pod | init container: prepare&#xA;2026/04/19 13:53:06 Entrypoint initialization&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-build-container-pod | init container: place-scripts&#xA;2026/04/19 13:53:07 Decoded script /tekton/scripts/script-0-hbpsf&#xA;2026/04/19 13:53:07 Decoded script /tekton/scripts/script-1-4wbww&#xA;2026/04/19 13:53:07 Decoded script /tekton/scripts/script-2-c7glj&#xA;2026/04/19 13:53:07 Decoded script /tekton/scripts/script-3-gsg96&#xA;2026/04/19 13:53:07 Decoded script /tekton/scripts/script-4-fwz85&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-build-container-pod | init container: working-dir-initializer&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-build-container-pod | container step-build: &#xA;[2026-04-19T13:53:12,317040219+00:00] Validate context path&#xA;[2026-04-19T13:53:12,320681271+00:00] Update CA trust&#xA;[2026-04-19T13:53:12,322019999+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-04-19T13:53:14,540991839+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-04-19T13:53:14,548074635+00:00] Prepare system (architecture: x86_64)&#xA;[2026-04-19T13:53:14,658762091+00:00] Setup prefetched&#xA;Trying to pull quay.io/devfile/python:slim...&#xA;Getting image source signatures&#xA;Copying blob sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#xA;Copying blob sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#xA;Copying blob sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#xA;Copying blob sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#xA;Copying blob sha256:30fb943195a7f7cee90a9c67461c338d1d76a7004d2f94792b774ef71d875a02&#xA;Copying config sha256:04f51101c1b979fb8a45a5332bfa8ed2c60f613ea396c3edd40f3d91702b24ef&#xA;Writing manifest to image destination&#xA;[2026-04-19T13:53:33,033658287+00:00] Unsetting proxy&#xA;{&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;d2388fe1871d355bc27342e92fa9ff21797dba3e&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;d2388fe1871d355bc27342e92fa9ff21797dba3e&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#34;,&#xA;  &#34;quay.expires-after&#34;: &#34;6h&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-04-19T13:53:14Z&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-04-19T13:53:14Z&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;&#xA;}&#xA;[2026-04-19T13:53:33,096318114+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-04-19T13:53:33,100848492+00:00] Add secrets&#xA;[2026-04-19T13:53:33,110667699+00:00] Run buildah build&#xA;[2026-04-19T13:53:33,112201129+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=d2388fe1871d355bc27342e92fa9ff21797dba3e --label org.opencontainers.image.revision=d2388fe1871d355bc27342e92fa9ff21797dba3e --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-python-basic --label quay.expires-after=6h --label build-date=2026-04-19T13:53:14Z --label org.opencontainers.image.created=2026-04-19T13:53:14Z --annotation org.opencontainers.image.revision=d2388fe1871d355bc27342e92fa9ff21797dba3e --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-python-basic --annotation org.opencontainers.image.created=2026-04-19T13:53:14Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.nvUrdO -t quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e . &#xA;STEP 1/11: FROM quay.io/devfile/python:slim&#xA;STEP 2/11: EXPOSE 8081/tcp&#xA;STEP 3/11: ENV FLASK_PORT=8081&#xA;STEP 4/11: WORKDIR /projects&#xA;STEP 5/11: COPY requirements.txt .&#xA;STEP 6/11: RUN pip install -r requirements.txt&#xA;Collecting Flask==2.1.0&#xA;  Downloading Flask-2.1.0-py3-none-any.whl (95 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 95.2/95.2 kB 22.7 MB/s eta 0:00:00&#xA;Collecting Werkzeug&gt;=2.0&#xA;  Downloading werkzeug-3.1.8-py3-none-any.whl (226 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 226.5/226.5 kB 94.6 MB/s eta 0:00:00&#xA;Collecting Jinja2&gt;=3.0&#xA;  Downloading jinja2-3.1.6-py3-none-any.whl (134 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 134.9/134.9 kB 96.5 MB/s eta 0:00:00&#xA;Collecting itsdangerous&gt;=2.0&#xA;  Downloading itsdangerous-2.2.0-py3-none-any.whl (16 kB)&#xA;Collecting click&gt;=8.0&#xA;  Downloading click-8.3.2-py3-none-any.whl (108 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 108.4/108.4 kB 71.0 MB/s eta 0:00:00&#xA;Collecting MarkupSafe&gt;=2.0&#xA;  Downloading markupsafe-3.0.3-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (22 kB)&#xA;Installing collected packages: MarkupSafe, itsdangerous, click, Werkzeug, Jinja2, Flask&#xA;Successfully installed Flask-2.1.0 Jinja2-3.1.6 MarkupSafe-3.0.3 Werkzeug-3.1.8 click-8.3.2 itsdangerous-2.2.0&#xA;WARNING: Running pip as the &#39;root&#39; user can result in broken permissions and conflicting behaviour with the system package manager. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv&#xA;&#xA;[notice] A new release of pip available: 22.3.1 -&gt; 26.0.1&#xA;[notice] To update, run: pip install --upgrade pip&#xA;STEP 7/11: COPY . .&#xA;STEP 8/11: CMD [ &#34;python&#34;, &#34;./app.py&#34; ]&#xA;STEP 9/11: COPY labels.json /usr/share/buildinfo/labels.json&#xA;STEP 10/11: COPY labels.json /root/buildinfo/labels.json&#xA;STEP 11/11: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;d2388fe1871d355bc27342e92fa9ff21797dba3e&#34; &#34;org.opencontainers.image.revision&#34;=&#34;d2388fe1871d355bc27342e92fa9ff21797dba3e&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#34; &#34;quay.expires-after&#34;=&#34;6h&#34; &#34;build-date&#34;=&#34;2026-04-19T13:53:14Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-04-19T13:53:14Z&#34;&#xA;COMMIT quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#xA;--&gt; a9cb738a84c6&#xA;Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#xA;a9cb738a84c62f7fd16213bb35e2d674152e86320a80c133f85257194e821bf8&#xA;[2026-04-19T13:53:37,618007623+00:00] Unsetting proxy&#xA;[2026-04-19T13:53:37,619921405+00:00] Add metadata&#xA;Recording base image digests used&#xA;quay.io/devfile/python:slim quay.io/devfile/python:slim@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c&#xA;Getting image source signatures&#xA;Copying blob sha256:a47feb245a29b23fa654ddd0be06af9fe75cd7f7000b5fd8ddf733bc64cafdc4&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying config sha256:a9cb738a84c62f7fd16213bb35e2d674152e86320a80c133f85257194e821bf8&#xA;Writing manifest to image destination&#xA;[2026-04-19T13:53:39,648636387+00:00] End build&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-build-container-pod | container step-push: &#xA;[2026-04-19T13:53:39,685217185+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-04-19T13:53:42,054421586+00:00] Convert image&#xA;[2026-04-19T13:53:42,055481099+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:test-comp-iwsw-on-pull-request-cqm7h-build-container&#xA;[retry] executing: buildah push --format=oci --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e docker://quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:test-comp-iwsw-on-pull-request-cqm7h-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:a47feb245a29b23fa654ddd0be06af9fe75cd7f7000b5fd8ddf733bc64cafdc4&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying config sha256:a9cb738a84c62f7fd16213bb35e2d674152e86320a80c133f85257194e821bf8&#xA;Writing manifest to image destination&#xA;[2026-04-19T13:54:00,755871956+00:00] Push image with git revision&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#xA;[retry] executing: buildah push --format=oci --retry 3 --tls-verify=true --digestfile /workspace/source/image-digest quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e docker://quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#xA;Getting image source signatures&#xA;Copying blob sha256:a47feb245a29b23fa654ddd0be06af9fe75cd7f7000b5fd8ddf733bc64cafdc4&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying config sha256:a9cb738a84c62f7fd16213bb35e2d674152e86320a80c133f85257194e821bf8&#xA;Writing manifest to image destination&#xA;sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#xA;[retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;[2026-04-19T13:54:02,474672664+00:00] End push&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-build-container-pod | container step-sbom-syft-generate: &#xA;[2026-04-19T13:54:03,019854456+00:00] Generate SBOM&#xA;Running syft on the image&#xA;Running syft on the source code&#xA;[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;[2026-04-19T13:54:09,973909069+00:00] End sbom-syft-generate&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-build-container-pod | container step-prepare-sboms: &#xA;[2026-04-19T13:54:10,285918298+00:00] Prepare SBOM&#xA;[2026-04-19T13:54:10,289678842+00:00] Generate SBOM with mobster&#xA;Skipping SBOM validation&#xA;2026-04-19 13:54:11,416 [INFO] mobster.log: Logging level set to 20&#xA;2026-04-19 13:54:11,495 [INFO] mobster.oci: Fetching manifest for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c&#xA;2026-04-19 13:54:12,161 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-04-19 13:54:12,348 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-04-19 13:54:12,767 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-04-19 13:54:12,983 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-04-19 13:54:13,394 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-04-19 13:54:13,616 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-04-19 13:54:14,174 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-04-19 13:54:14,405 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-04-19 13:54:14,405 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;2026-04-19 13:54:14,405 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;2026-04-19 13:54:14,406 [INFO] mobster.log: Contextual workflow completed in 2.92s&#xA;2026-04-19 13:54:14,436 [INFO] mobster.main: Exiting with code 0.&#xA;[2026-04-19T13:54:14,540496468+00:00] End prepare-sboms&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-build-container-pod | container step-upload-sbom: &#xA;[2026-04-19T13:54:14,559128771+00:00] Upload SBOM&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw&#xA;Pushing sbom to registry&#xA;[retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e@sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6&#xA;WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw@sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6] to [quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:sha256-adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6.sbom] with mediaType [text/spdx+json].&#xA;&#xA;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw@sha256:4d01863e146fd57434de1e09fe5610192c6dff42237b5a3383e6fd70f6d60a25&#xA;[2026-04-19T13:54:18,969918730+00:00] End upload-sbom&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-build-image-index-pod | init container: prepare&#xA;2026/04/19 13:54:22 Entrypoint initialization&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-build-image-index-pod | init container: place-scripts&#xA;2026/04/19 13:54:22 Decoded script /tekton/scripts/script-0-4bcgr&#xA;2026/04/19 13:54:22 Decoded script /tekton/scripts/script-1-jd4wh&#xA;2026/04/19 13:54:22 Decoded script /tekton/scripts/script-2-vj998&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-build-image-index-pod | container step-build: &#xA;[2026-04-19T13:54:43,397266812+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Running konflux-build-cli&#xA;time=&#34;2026-04-19T13:54:45Z&#34; level=info msg=&#34;[param] image: quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#34;&#xA;time=&#34;2026-04-19T13:54:45Z&#34; level=info msg=&#34;[param] images: [quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e@sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6]&#34;&#xA;time=&#34;2026-04-19T13:54:45Z&#34; level=info msg=&#34;[param] buildah-format: oci&#34;&#xA;time=&#34;2026-04-19T13:54:45Z&#34; level=info msg=&#34;[param] always-build-index: false&#34;&#xA;time=&#34;2026-04-19T13:54:45Z&#34; level=info msg=&#34;[param] additional-tags: [test-comp-iwsw-on-pull-request-cqm7h-build-image-index]&#34;&#xA;time=&#34;2026-04-19T13:54:45Z&#34; level=info msg=&#34;[param] output-manifest-path: /index-build-data/manifest_data.json&#34;&#xA;time=&#34;2026-04-19T13:54:45Z&#34; level=info msg=&#34;[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST&#34;&#xA;time=&#34;2026-04-19T13:54:45Z&#34; level=info msg=&#34;[param] result-path-image-url: /tekton/results/IMAGE_URL&#34;&#xA;time=&#34;2026-04-19T13:54:45Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-04-19T13:54:45Z&#34; level=info msg=&#34;[param] result-path-images: /tekton/results/IMAGES&#34;&#xA;time=&#34;2026-04-19T13:54:45Z&#34; level=info msg=&#34;Creating manifest list: quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#34;&#xA;time=&#34;2026-04-19T13:54:45Z&#34; level=info msg=&#34;buildah [stdout] a8a337e0fdf5d714bf16d03fa5bce190ccd7a7f992cdf28de1bdfd54341dd495&#34; logger=CliExecutor&#xA;time=&#34;2026-04-19T13:54:45Z&#34; level=info msg=&#34;Skipping image index generation. Returning results for single image.&#34;&#xA;{&#34;image_digest&#34;:&#34;sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6&#34;,&#34;image_url&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#34;,&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw@sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6&#34;,&#34;images&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw@sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6&#34;}&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-build-image-index-pod | container step-create-sbom: &#xA;The manifest_data.json file does not exist. Skipping the SBOM creation...&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-build-image-index-pod | container step-upload-sbom: &#xA;[2026-04-19T13:54:45,556263789+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;The index.spdx.json file does not exists. Skipping the SBOM upload...&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-clair-scan-pod | init container: prepare&#xA;2026/04/19 13:54:50 Entrypoint initialization&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-clair-scan-pod | init container: place-scripts&#xA;2026/04/19 13:54:50 Decoded script /tekton/scripts/script-0-qqrx2&#xA;2026/04/19 13:54:50 Decoded script /tekton/scripts/script-1-cx9qm&#xA;2026/04/19 13:54:50 Decoded script /tekton/scripts/script-2-nmzkk&#xA;2026/04/19 13:54:50 Decoded script /tekton/scripts/script-3-wtkrc&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-clair-scan-pod | container step-get-image-manifests: &#xA;Inspecting raw image manifest quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw@sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6.&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-clair-scan-pod | container step-get-vulnerabilities: &#xA;Running clair-action on amd64 image manifest...&#xA;�[90m2026-04-19T13:58:57Z�[0m �[32mINF�[0m �[1mmatchers created�[0m �[36mcomponent=�[0mlibvuln/New �[36mmatchers=�[0m[{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ubuntu&#34;,&#34;name&#34;:&#34;ubuntu-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel&#34;,&#34;name&#34;:&#34;rhel&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/python&#34;,&#34;name&#34;:&#34;python&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ruby&#34;,&#34;name&#34;:&#34;ruby-gem&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/alpine&#34;,&#34;name&#34;:&#34;alpine-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/gobin&#34;,&#34;name&#34;:&#34;gobin&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/photon&#34;,&#34;name&#34;:&#34;photon&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel/rhcc&#34;,&#34;name&#34;:&#34;rhel-container-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/aws&#34;,&#34;name&#34;:&#34;aws-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/java&#34;,&#34;name&#34;:&#34;java-maven&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/suse&#34;,&#34;name&#34;:&#34;suse&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/debian&#34;,&#34;name&#34;:&#34;debian-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/oracle&#34;,&#34;name&#34;:&#34;oracle&#34;}]&#xA;�[90m2026-04-19T13:58:57Z�[0m �[32mINF�[0m �[1mlibvuln initialized�[0m �[36mcomponent=�[0mlibvuln/New&#xA;�[90m2026-04-19T13:58:58Z�[0m �[32mINF�[0m �[1mregistered configured scanners�[0m �[36mcomponent=�[0mlibindex/New&#xA;�[90m2026-04-19T13:58:58Z�[0m �[32mINF�[0m �[1mNewLayerScanner: constructing a new layer-scanner�[0m �[36mcomponent=�[0mindexer.NewLayerScanner&#xA;�[90m2026-04-19T13:58:58Z�[0m �[32mINF�[0m �[1mindex request start�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6&#xA;�[90m2026-04-19T13:58:58Z�[0m �[32mINF�[0m �[1mstarting scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6&#xA;�[90m2026-04-19T13:58:58Z�[0m �[32mINF�[0m �[1mmanifest to be scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6 �[36mstate=�[0mCheckManifest&#xA;�[90m2026-04-19T13:58:58Z�[0m �[32mINF�[0m �[1mlayers fetch start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-19T13:58:59Z�[0m �[32mINF�[0m �[1mlayers fetch success�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-19T13:58:59Z�[0m �[32mINF�[0m �[1mlayers fetch done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-19T13:58:59Z�[0m �[32mINF�[0m �[1mlayers scan start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6 �[36mstate=�[0mScanLayers&#xA;�[90m2026-04-19T13:58:59Z�[0m �[32mINF�[0m �[1mlayers scan done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6 �[36mstate=�[0mScanLayers&#xA;�[90m2026-04-19T13:58:59Z�[0m �[32mINF�[0m �[1mstarting index manifest�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6 �[36mstate=�[0mIndexManifest&#xA;�[90m2026-04-19T13:58:59Z�[0m �[32mINF�[0m �[1mfinishing scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6 �[36mstate=�[0mIndexFinished&#xA;�[90m2026-04-19T13:58:59Z�[0m �[32mINF�[0m �[1mmanifest successfully scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6 �[36mstate=�[0mIndexFinished&#xA;�[90m2026-04-19T13:59:00Z�[0m �[32mINF�[0m �[1mindex request done�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6&#xA;{&#xA;  &#34;manifest_hash&#34;: &#34;sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6&#34;,&#xA;  &#34;packages&#34;: {&#xA;    &#34;+GDQTbek1zYvATiVR/wBCA==&#34;: {&#xA;      &#34;id&#34;: &#34;+GDQTbek1zYvATiVR/wBCA==&#34;,&#xA;      &#34;name&#34;: &#34;gzip&#34;,&#xA;      &#34;version&#34;: &#34;1.10-4+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gzip&#34;,&#xA;        &#34;version&#34;: &#34;1.10-4+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+aaqENN9U+Kuxcb1tQ8Utg==&#34;: {&#xA;      &#34;id&#34;: &#34;+aaqENN9U+Kuxcb1tQ8Utg==&#34;,&#xA;      &#34;name&#34;: &#34;netbase&#34;,&#xA;      &#34;version&#34;: &#34;6.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;netbase&#34;,&#xA;        &#34;version&#34;: &#34;6.3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+ol9cHiNc+RWiD7Kw3TLCg==&#34;: {&#xA;      &#34;id&#34;: &#34;+ol9cHiNc+RWiD7Kw3TLCg==&#34;,&#xA;      &#34;name&#34;: &#34;libcom-err2&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;05vApGRmP6ko1S0ji87IIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;05vApGRmP6ko1S0ji87IIQ==&#34;,&#xA;      &#34;name&#34;: &#34;libunistring2&#34;,&#xA;      &#34;version&#34;: &#34;0.9.10-4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libunistring&#34;,&#xA;        &#34;version&#34;: &#34;0.9.10-4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0jMyX7UCIuSpntMN1r7Ofg==&#34;: {&#xA;      &#34;id&#34;: &#34;0jMyX7UCIuSpntMN1r7Ofg==&#34;,&#xA;      &#34;name&#34;: &#34;libzstd1&#34;,&#xA;      &#34;version&#34;: &#34;1.4.8+dfsg-2.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libzstd&#34;,&#xA;        &#34;version&#34;: &#34;1.4.8+dfsg-2.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1jyJPCL93kiEbfmNKeyz3g==&#34;: {&#xA;      &#34;id&#34;: &#34;1jyJPCL93kiEbfmNKeyz3g==&#34;,&#xA;      &#34;name&#34;: &#34;jinja2&#34;,&#xA;      &#34;version&#34;: &#34;3.1.6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.3.1.6.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2MObxiEVNllmUEzdVZM5qw==&#34;: {&#xA;      &#34;id&#34;: &#34;2MObxiEVNllmUEzdVZM5qw==&#34;,&#xA;      &#34;name&#34;: &#34;apt&#34;,&#xA;      &#34;version&#34;: &#34;2.2.4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;apt&#34;,&#xA;        &#34;version&#34;: &#34;2.2.4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3f992oeEQfSQxRA0nlq8Wg==&#34;: {&#xA;      &#34;id&#34;: &#34;3f992oeEQfSQxRA0nlq8Wg==&#34;,&#xA;      &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;      &#34;version&#34;: &#34;1.8.7-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;1.8.7-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4672uZtn8TnHDEzWVyhfjw==&#34;: {&#xA;      &#34;id&#34;: &#34;4672uZtn8TnHDEzWVyhfjw==&#34;,&#xA;      &#34;name&#34;: &#34;base-files&#34;,&#xA;      &#34;version&#34;: &#34;11.1+deb11u5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;base-files&#34;,&#xA;        &#34;version&#34;: &#34;11.1+deb11u5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4jCPzhS6OWt4agz9d/cfTw==&#34;: {&#xA;      &#34;id&#34;: &#34;4jCPzhS6OWt4agz9d/cfTw==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-base&#34;,&#xA;      &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5zxxTA220k9gPCegfDHkag==&#34;: {&#xA;      &#34;id&#34;: &#34;5zxxTA220k9gPCegfDHkag==&#34;,&#xA;      &#34;name&#34;: &#34;libgmp10&#34;,&#xA;      &#34;version&#34;: &#34;2:6.2.1+dfsg-1+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gmp&#34;,&#xA;        &#34;version&#34;: &#34;2:6.2.1+dfsg-1+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7a3yla6TRFZrhmAreU7f8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;7a3yla6TRFZrhmAreU7f8Q==&#34;,&#xA;      &#34;name&#34;: &#34;libexpat1&#34;,&#xA;      &#34;version&#34;: &#34;2.2.10-2+deb11u5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;2.2.10-2+deb11u5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8alfBYUr5uWbAyB5PrY8Hg==&#34;: {&#xA;      &#34;id&#34;: &#34;8alfBYUr5uWbAyB5PrY8Hg==&#34;,&#xA;      &#34;name&#34;: &#34;libudev1&#34;,&#xA;      &#34;version&#34;: &#34;247.3-7+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;247.3-7+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9snKXrH4dQy2IXHQ01Lg0A==&#34;: {&#xA;      &#34;id&#34;: &#34;9snKXrH4dQy2IXHQ01Lg0A==&#34;,&#xA;      &#34;name&#34;: &#34;libaudit1&#34;,&#xA;      &#34;version&#34;: &#34;1:3.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;audit&#34;,&#xA;        &#34;version&#34;: &#34;1:3.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Akbft1KN+9FKNhh1tM25eA==&#34;: {&#xA;      &#34;id&#34;: &#34;Akbft1KN+9FKNhh1tM25eA==&#34;,&#xA;      &#34;name&#34;: &#34;mount&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BJL42acLPAR8bEnmM1Z3mg==&#34;: {&#xA;      &#34;id&#34;: &#34;BJL42acLPAR8bEnmM1Z3mg==&#34;,&#xA;      &#34;name&#34;: &#34;libblkid1&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CBzoMmlXBcyP54HOnauO0g==&#34;: {&#xA;      &#34;id&#34;: &#34;CBzoMmlXBcyP54HOnauO0g==&#34;,&#xA;      &#34;name&#34;: &#34;libpam-runtime&#34;,&#xA;      &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CpILSbg3p6D7Gsp8sCW1Rg==&#34;: {&#xA;      &#34;id&#34;: &#34;CpILSbg3p6D7Gsp8sCW1Rg==&#34;,&#xA;      &#34;name&#34;: &#34;libsemanage1&#34;,&#xA;      &#34;version&#34;: &#34;3.1-1+b2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsemanage&#34;,&#xA;        &#34;version&#34;: &#34;3.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;D0G6c/ML9XX4eoGHgx1jeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;D0G6c/ML9XX4eoGHgx1jeQ==&#34;,&#xA;      &#34;name&#34;: &#34;libc6&#34;,&#xA;      &#34;version&#34;: &#34;2.31-13+deb11u5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.31-13+deb11u5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DY5Co0gkGtbgwDlkjfJLWA==&#34;: {&#xA;      &#34;id&#34;: &#34;DY5Co0gkGtbgwDlkjfJLWA==&#34;,&#xA;      &#34;name&#34;: &#34;markupsafe&#34;,&#xA;      &#34;version&#34;: &#34;3.0.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.3.0.3.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DtMxcnDA8Je9vAHjmzagaA==&#34;: {&#xA;      &#34;id&#34;: &#34;DtMxcnDA8Je9vAHjmzagaA==&#34;,&#xA;      &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EVGnnBfWyiVHhoIR4vEpgg==&#34;: {&#xA;      &#34;id&#34;: &#34;EVGnnBfWyiVHhoIR4vEpgg==&#34;,&#xA;      &#34;name&#34;: &#34;libbz2-1.0&#34;,&#xA;      &#34;version&#34;: &#34;1.0.8-4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bzip2&#34;,&#xA;        &#34;version&#34;: &#34;1.0.8-4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ExYxXcgoIRjAjUObwDE4jA==&#34;: {&#xA;      &#34;id&#34;: &#34;ExYxXcgoIRjAjUObwDE4jA==&#34;,&#xA;      &#34;name&#34;: &#34;libk5crypto3&#34;,&#xA;      &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FJIijlwFNqvdoVBcfTF/pg==&#34;: {&#xA;      &#34;id&#34;: &#34;FJIijlwFNqvdoVBcfTF/pg==&#34;,&#xA;      &#34;name&#34;: &#34;login&#34;,&#xA;      &#34;version&#34;: &#34;1:4.8.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;1:4.8.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FOAAB3KiNsLyi03hQsjRTA==&#34;: {&#xA;      &#34;id&#34;: &#34;FOAAB3KiNsLyi03hQsjRTA==&#34;,&#xA;      &#34;name&#34;: &#34;libcrypt1&#34;,&#xA;      &#34;version&#34;: &#34;1:4.4.18-4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;        &#34;version&#34;: &#34;1:4.4.18-4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FrUy4mOCaHm5aGT53as3JQ==&#34;: {&#xA;      &#34;id&#34;: &#34;FrUy4mOCaHm5aGT53as3JQ==&#34;,&#xA;      &#34;name&#34;: &#34;diffutils&#34;,&#xA;      &#34;version&#34;: &#34;1:3.7-5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;diffutils&#34;,&#xA;        &#34;version&#34;: &#34;1:3.7-5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;G/7q+D+DsqYAVnohcyuzgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;G/7q+D+DsqYAVnohcyuzgQ==&#34;,&#xA;      &#34;name&#34;: &#34;libssl1.1&#34;,&#xA;      &#34;version&#34;: &#34;1.1.1n-0+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;1.1.1n-0+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GGaavnLgXX31qx9chfhdOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GGaavnLgXX31qx9chfhdOQ==&#34;,&#xA;      &#34;name&#34;: &#34;libaudit-common&#34;,&#xA;      &#34;version&#34;: &#34;1:3.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;audit&#34;,&#xA;        &#34;version&#34;: &#34;1:3.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Gm6VA87iOnaQ0rWR6oO9eA==&#34;: {&#xA;      &#34;id&#34;: &#34;Gm6VA87iOnaQ0rWR6oO9eA==&#34;,&#xA;      &#34;name&#34;: &#34;libpcre2-8-0&#34;,&#xA;      &#34;version&#34;: &#34;10.36-2+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;10.36-2+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HFwGHerHwgvY8vkjr3x1Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;HFwGHerHwgvY8vkjr3x1Pg==&#34;,&#xA;      &#34;name&#34;: &#34;itsdangerous&#34;,&#xA;      &#34;version&#34;: &#34;2.2.0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.2.2.0.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IQfQp74RcAWE7jHtQsMLHg==&#34;: {&#xA;      &#34;id&#34;: &#34;IQfQp74RcAWE7jHtQsMLHg==&#34;,&#xA;      &#34;name&#34;: &#34;bsdutils&#34;,&#xA;      &#34;version&#34;: &#34;1:2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IiJKm8T4olfm6rhuKayFOw==&#34;: {&#xA;      &#34;id&#34;: &#34;IiJKm8T4olfm6rhuKayFOw==&#34;,&#xA;      &#34;name&#34;: &#34;lsb-base&#34;,&#xA;      &#34;version&#34;: &#34;11.1.0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lsb&#34;,&#xA;        &#34;version&#34;: &#34;11.1.0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Jg2vDvx1JxyPDIrUzzR9NQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Jg2vDvx1JxyPDIrUzzR9NQ==&#34;,&#xA;      &#34;name&#34;: &#34;grep&#34;,&#xA;      &#34;version&#34;: &#34;3.6-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;grep&#34;,&#xA;        &#34;version&#34;: &#34;3.6-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LOfpAnA/2f7zE4SFJCrxVg==&#34;: {&#xA;      &#34;id&#34;: &#34;LOfpAnA/2f7zE4SFJCrxVg==&#34;,&#xA;      &#34;name&#34;: &#34;zlib1g&#34;,&#xA;      &#34;version&#34;: &#34;1:1.2.11.dfsg-2+deb11u2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;1:1.2.11.dfsg-2+deb11u2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LVHVhWoZgWwWvOspyUwb1w==&#34;: {&#xA;      &#34;id&#34;: &#34;LVHVhWoZgWwWvOspyUwb1w==&#34;,&#xA;      &#34;name&#34;: &#34;libreadline8&#34;,&#xA;      &#34;version&#34;: &#34;8.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;readline&#34;,&#xA;        &#34;version&#34;: &#34;8.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MvKvHHnD0jaLaWpyHvkhgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;MvKvHHnD0jaLaWpyHvkhgQ==&#34;,&#xA;      &#34;name&#34;: &#34;passwd&#34;,&#xA;      &#34;version&#34;: &#34;1:4.8.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;1:4.8.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NA4G2YrIZ73fsX7d5r5rGw==&#34;: {&#xA;      &#34;id&#34;: &#34;NA4G2YrIZ73fsX7d5r5rGw==&#34;,&#xA;      &#34;name&#34;: &#34;debconf&#34;,&#xA;      &#34;version&#34;: &#34;1.5.77&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;debconf&#34;,&#xA;        &#34;version&#34;: &#34;1.5.77&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NzkVb7F31E+Vxxz3PCS6tg==&#34;: {&#xA;      &#34;id&#34;: &#34;NzkVb7F31E+Vxxz3PCS6tg==&#34;,&#xA;      &#34;name&#34;: &#34;libkrb5support0&#34;,&#xA;      &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OgJFdUXRfF1Ls8u1+eOivw==&#34;: {&#xA;      &#34;id&#34;: &#34;OgJFdUXRfF1Ls8u1+eOivw==&#34;,&#xA;      &#34;name&#34;: &#34;libgpg-error0&#34;,&#xA;      &#34;version&#34;: &#34;1.38-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;        &#34;version&#34;: &#34;1.38-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;PaaRbD/FkW3JARtSKQgRcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;PaaRbD/FkW3JARtSKQgRcQ==&#34;,&#xA;      &#34;name&#34;: &#34;libattr1&#34;,&#xA;      &#34;version&#34;: &#34;1:2.4.48-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;attr&#34;,&#xA;        &#34;version&#34;: &#34;1:2.4.48-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;PgPY5hWnihXRN45byvzY0g==&#34;: {&#xA;      &#34;id&#34;: &#34;PgPY5hWnihXRN45byvzY0g==&#34;,&#xA;      &#34;name&#34;: &#34;libncursesw6&#34;,&#xA;      &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;R1TkRM71ql+JWgz0VF5ESQ==&#34;: {&#xA;      &#34;id&#34;: &#34;R1TkRM71ql+JWgz0VF5ESQ==&#34;,&#xA;      &#34;name&#34;: &#34;libsepol1&#34;,&#xA;      &#34;version&#34;: &#34;3.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;3.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RAMuXEdVU4AJ/z4aiK/NNg==&#34;: {&#xA;      &#34;id&#34;: &#34;RAMuXEdVU4AJ/z4aiK/NNg==&#34;,&#xA;      &#34;name&#34;: &#34;setuptools&#34;,&#xA;      &#34;version&#34;: &#34;65.5.0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.65.5.0.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RYsqO4ROpGMzzCO5WaTrlw==&#34;: {&#xA;      &#34;id&#34;: &#34;RYsqO4ROpGMzzCO5WaTrlw==&#34;,&#xA;      &#34;name&#34;: &#34;dpkg&#34;,&#xA;      &#34;version&#34;: &#34;1.20.12&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dpkg&#34;,&#xA;        &#34;version&#34;: &#34;1.20.12&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RgdwX+VC70nXZ2E527PXaA==&#34;: {&#xA;      &#34;id&#34;: &#34;RgdwX+VC70nXZ2E527PXaA==&#34;,&#xA;      &#34;name&#34;: &#34;logsave&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SWnjL4fWu+WMpxhSCWLhZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;SWnjL4fWu+WMpxhSCWLhZQ==&#34;,&#xA;      &#34;name&#34;: &#34;base-passwd&#34;,&#xA;      &#34;version&#34;: &#34;3.5.51&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;base-passwd&#34;,&#xA;        &#34;version&#34;: &#34;3.5.51&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;T5NuX1yinNyGoZNN2r9u4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;T5NuX1yinNyGoZNN2r9u4Q==&#34;,&#xA;      &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;      &#34;version&#34;: &#34;20210119&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;        &#34;version&#34;: &#34;20210119&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VVXsYlCxogg17Ti1iR03Mw==&#34;: {&#xA;      &#34;id&#34;: &#34;VVXsYlCxogg17Ti1iR03Mw==&#34;,&#xA;      &#34;name&#34;: &#34;libseccomp2&#34;,&#xA;      &#34;version&#34;: &#34;2.5.1-1+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libseccomp&#34;,&#xA;        &#34;version&#34;: &#34;2.5.1-1+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VbNyM3GfR5vEmJdFAiKqrA==&#34;: {&#xA;      &#34;id&#34;: &#34;VbNyM3GfR5vEmJdFAiKqrA==&#34;,&#xA;      &#34;name&#34;: &#34;gcc-9-base&#34;,&#xA;      &#34;version&#34;: &#34;9.3.0-22&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-9&#34;,&#xA;        &#34;version&#34;: &#34;9.3.0-22&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Wi4oa03apqVdR6okNeZiNA==&#34;: {&#xA;      &#34;id&#34;: &#34;Wi4oa03apqVdR6okNeZiNA==&#34;,&#xA;      &#34;name&#34;: &#34;libgnutls30&#34;,&#xA;      &#34;version&#34;: &#34;3.7.1-5+deb11u2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;3.7.1-5+deb11u2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZPlAztePXX+uFLVDX2lgNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ZPlAztePXX+uFLVDX2lgNQ==&#34;,&#xA;      &#34;name&#34;: &#34;libsemanage-common&#34;,&#xA;      &#34;version&#34;: &#34;3.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsemanage&#34;,&#xA;        &#34;version&#34;: &#34;3.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZWeYh81MRCu1nh3mOyptIA==&#34;: {&#xA;      &#34;id&#34;: &#34;ZWeYh81MRCu1nh3mOyptIA==&#34;,&#xA;      &#34;name&#34;: &#34;libmount1&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bGWj1aSf0wvrecU/pdTv5A==&#34;: {&#xA;      &#34;id&#34;: &#34;bGWj1aSf0wvrecU/pdTv5A==&#34;,&#xA;      &#34;name&#34;: &#34;gcc-10-base&#34;,&#xA;      &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-10&#34;,&#xA;        &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bHkSxcl6e1quNxLGb6uX8A==&#34;: {&#xA;      &#34;id&#34;: &#34;bHkSxcl6e1quNxLGb6uX8A==&#34;,&#xA;      &#34;name&#34;: &#34;coreutils&#34;,&#xA;      &#34;version&#34;: &#34;8.32-4+b1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;8.32-4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bTSLWiizipO2axtmvXFuVg==&#34;: {&#xA;      &#34;id&#34;: &#34;bTSLWiizipO2axtmvXFuVg==&#34;,&#xA;      &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;      &#34;version&#34;: &#34;4.16.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;        &#34;version&#34;: &#34;4.16.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;be3s5y0dx4bgsQboIoDduw==&#34;: {&#xA;      &#34;id&#34;: &#34;be3s5y0dx4bgsQboIoDduw==&#34;,&#xA;      &#34;name&#34;: &#34;libp11-kit0&#34;,&#xA;      &#34;version&#34;: &#34;0.23.22-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;p11-kit&#34;,&#xA;        &#34;version&#34;: &#34;0.23.22-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;brvvAQ6V7yp7QbUuk+W5Hg==&#34;: {&#xA;      &#34;id&#34;: &#34;brvvAQ6V7yp7QbUuk+W5Hg==&#34;,&#xA;      &#34;name&#34;: &#34;libext2fs2&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;d4b/e0nx+/vPWuPB7oDzPw==&#34;: {&#xA;      &#34;id&#34;: &#34;d4b/e0nx+/vPWuPB7oDzPw==&#34;,&#xA;      &#34;name&#34;: &#34;libc-bin&#34;,&#xA;      &#34;version&#34;: &#34;2.31-13+deb11u5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.31-13+deb11u5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dRfu6Up2F2Ze+gJ21oSeug==&#34;: {&#xA;      &#34;id&#34;: &#34;dRfu6Up2F2Ze+gJ21oSeug==&#34;,&#xA;      &#34;name&#34;: &#34;libgdbm6&#34;,&#xA;      &#34;version&#34;: &#34;1.19-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdbm&#34;,&#xA;        &#34;version&#34;: &#34;1.19-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dUT53gagQO5Ac9Bdlu5dAw==&#34;: {&#xA;      &#34;id&#34;: &#34;dUT53gagQO5Ac9Bdlu5dAw==&#34;,&#xA;      &#34;name&#34;: &#34;sysvinit-utils&#34;,&#xA;      &#34;version&#34;: &#34;2.96-7+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sysvinit&#34;,&#xA;        &#34;version&#34;: &#34;2.96-7+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dXglURzzdbLnOf14mab1Hg==&#34;: {&#xA;      &#34;id&#34;: &#34;dXglURzzdbLnOf14mab1Hg==&#34;,&#xA;      &#34;name&#34;: &#34;tar&#34;,&#xA;      &#34;version&#34;: &#34;1.34+dfsg-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;1.34+dfsg-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dobmrwm7aq9puvFHwNgXxw==&#34;: {&#xA;      &#34;id&#34;: &#34;dobmrwm7aq9puvFHwNgXxw==&#34;,&#xA;      &#34;name&#34;: &#34;libstdc++6&#34;,&#xA;      &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-10&#34;,&#xA;        &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dv3AlW8tBL4D0mEPW7/Z2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;dv3AlW8tBL4D0mEPW7/Z2Q==&#34;,&#xA;      &#34;name&#34;: &#34;libpam-modules-bin&#34;,&#xA;      &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eF2QIdrTmJlWmjQTkhntow==&#34;: {&#xA;      &#34;id&#34;: &#34;eF2QIdrTmJlWmjQTkhntow==&#34;,&#xA;      &#34;name&#34;: &#34;wheel&#34;,&#xA;      &#34;version&#34;: &#34;0.38.4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.0.38.4.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;elSR7m8uLWd/kMl2jxTm/A==&#34;: {&#xA;      &#34;id&#34;: &#34;elSR7m8uLWd/kMl2jxTm/A==&#34;,&#xA;      &#34;name&#34;: &#34;libpam-modules&#34;,&#xA;      &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;evNF5YpSAxyFV7iWv3lSVw==&#34;: {&#xA;      &#34;id&#34;: &#34;evNF5YpSAxyFV7iWv3lSVw==&#34;,&#xA;      &#34;name&#34;: &#34;openssl&#34;,&#xA;      &#34;version&#34;: &#34;1.1.1n-0+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;1.1.1n-0+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fCmdLCR2Ix0ldnZL1Fa52A==&#34;: {&#xA;      &#34;id&#34;: &#34;fCmdLCR2Ix0ldnZL1Fa52A==&#34;,&#xA;      &#34;name&#34;: &#34;bash&#34;,&#xA;      &#34;version&#34;: &#34;5.1-2+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bash&#34;,&#xA;        &#34;version&#34;: &#34;5.1-2+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fqwKjkzVNvsxh6040zt05g==&#34;: {&#xA;      &#34;id&#34;: &#34;fqwKjkzVNvsxh6040zt05g==&#34;,&#xA;      &#34;name&#34;: &#34;hostname&#34;,&#xA;      &#34;version&#34;: &#34;3.23&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;hostname&#34;,&#xA;        &#34;version&#34;: &#34;3.23&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fyM9Y65kt8cTfJv4LKF7bg==&#34;: {&#xA;      &#34;id&#34;: &#34;fyM9Y65kt8cTfJv4LKF7bg==&#34;,&#xA;      &#34;name&#34;: &#34;libcap-ng0&#34;,&#xA;      &#34;version&#34;: &#34;0.7.9-2.2+b1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;        &#34;version&#34;: &#34;0.7.9-2.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gP9HgvZWct50Kw/hM7BCKg==&#34;: {&#xA;      &#34;id&#34;: &#34;gP9HgvZWct50Kw/hM7BCKg==&#34;,&#xA;      &#34;name&#34;: &#34;libtirpc-common&#34;,&#xA;      &#34;version&#34;: &#34;1.3.1-1+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtirpc&#34;,&#xA;        &#34;version&#34;: &#34;1.3.1-1+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gv6x84VyNacZgvJrC59jbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;gv6x84VyNacZgvJrC59jbQ==&#34;,&#xA;      &#34;name&#34;: &#34;libffi7&#34;,&#xA;      &#34;version&#34;: &#34;3.3-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libffi&#34;,&#xA;        &#34;version&#34;: &#34;3.3-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hdNUjYIlrdEAtBWAggakAw==&#34;: {&#xA;      &#34;id&#34;: &#34;hdNUjYIlrdEAtBWAggakAw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-base&#34;,&#xA;      &#34;version&#34;: &#34;5.32.1-4+deb11u2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-4+deb11u2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;i4JkQ9JgSpZVyPFWOY5Bxw==&#34;: {&#xA;      &#34;id&#34;: &#34;i4JkQ9JgSpZVyPFWOY5Bxw==&#34;,&#xA;      &#34;name&#34;: &#34;liblz4-1&#34;,&#xA;      &#34;version&#34;: &#34;1.9.3-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lz4&#34;,&#xA;        &#34;version&#34;: &#34;1.9.3-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iWqdRZmp08/Tx22qEtmjJg==&#34;: {&#xA;      &#34;id&#34;: &#34;iWqdRZmp08/Tx22qEtmjJg==&#34;,&#xA;      &#34;name&#34;: &#34;libpcre3&#34;,&#xA;      &#34;version&#34;: &#34;2:8.39-13&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;2:8.39-13&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jErhz6PtXvAy/EPWJ425rA==&#34;: {&#xA;      &#34;id&#34;: &#34;jErhz6PtXvAy/EPWJ425rA==&#34;,&#xA;      &#34;name&#34;: &#34;libuuid1&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jKa8Us2cqGejhOc2/n5DDA==&#34;: {&#xA;      &#34;id&#34;: &#34;jKa8Us2cqGejhOc2/n5DDA==&#34;,&#xA;      &#34;name&#34;: &#34;libsmartcols1&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kq4lGEwi4agkgAJAkDs9Ng==&#34;: {&#xA;      &#34;id&#34;: &#34;kq4lGEwi4agkgAJAkDs9Ng==&#34;,&#xA;      &#34;name&#34;: &#34;flask&#34;,&#xA;      &#34;version&#34;: &#34;2.1.0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.2.1.0.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;krch6TQqNWzRi5F/dDkF+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;krch6TQqNWzRi5F/dDkF+Q==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-bin&#34;,&#xA;      &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;l5lCPjtOmPM8/LLh9+NjeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;l5lCPjtOmPM8/LLh9+NjeQ==&#34;,&#xA;      &#34;name&#34;: &#34;gpgv&#34;,&#xA;      &#34;version&#34;: &#34;2.2.27-2+deb11u2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;2.2.27-2+deb11u2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;l89yAZ/vyULk4EoaRdbg9w==&#34;: {&#xA;      &#34;id&#34;: &#34;l89yAZ/vyULk4EoaRdbg9w==&#34;,&#xA;      &#34;name&#34;: &#34;click&#34;,&#xA;      &#34;version&#34;: &#34;8.3.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.8.3.2.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lCjIskl1HulEHShaXtgmwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lCjIskl1HulEHShaXtgmwQ==&#34;,&#xA;      &#34;name&#34;: &#34;libtinfo6&#34;,&#xA;      &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lvz5sq0NbU6sy/F1tg9uiQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lvz5sq0NbU6sy/F1tg9uiQ==&#34;,&#xA;      &#34;name&#34;: &#34;libkeyutils1&#34;,&#xA;      &#34;version&#34;: &#34;1.6.1-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;keyutils&#34;,&#xA;        &#34;version&#34;: &#34;1.6.1-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mlFDx1iAC2OWpmYHut2JHw==&#34;: {&#xA;      &#34;id&#34;: &#34;mlFDx1iAC2OWpmYHut2JHw==&#34;,&#xA;      &#34;name&#34;: &#34;libnettle8&#34;,&#xA;      &#34;version&#34;: &#34;3.7.3-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nettle&#34;,&#xA;        &#34;version&#34;: &#34;3.7.3-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nV87o429QBKIpM8DyOv4wg==&#34;: {&#xA;      &#34;id&#34;: &#34;nV87o429QBKIpM8DyOv4wg==&#34;,&#xA;      &#34;name&#34;: &#34;debian-archive-keyring&#34;,&#xA;      &#34;version&#34;: &#34;2021.1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;debian-archive-keyring&#34;,&#xA;        &#34;version&#34;: &#34;2021.1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ngOu/a+sfrdDkZtETF1mgg==&#34;: {&#xA;      &#34;id&#34;: &#34;ngOu/a+sfrdDkZtETF1mgg==&#34;,&#xA;      &#34;name&#34;: &#34;libselinux1&#34;,&#xA;      &#34;version&#34;: &#34;3.1-3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libselinux&#34;,&#xA;        &#34;version&#34;: &#34;3.1-3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nmd/xrCD27AKRWAzA5JZCA==&#34;: {&#xA;      &#34;id&#34;: &#34;nmd/xrCD27AKRWAzA5JZCA==&#34;,&#xA;      &#34;name&#34;: &#34;mawk&#34;,&#xA;      &#34;version&#34;: &#34;1.3.4.20200120-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;mawk&#34;,&#xA;        &#34;version&#34;: &#34;1.3.4.20200120-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;npX4tBmidkxp2QJN/c3Ktw==&#34;: {&#xA;      &#34;id&#34;: &#34;npX4tBmidkxp2QJN/c3Ktw==&#34;,&#xA;      &#34;name&#34;: &#34;libdebconfclient0&#34;,&#xA;      &#34;version&#34;: &#34;0.260&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cdebconf&#34;,&#xA;        &#34;version&#34;: &#34;0.260&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nwapLKtbHTjy1u8+aA0X+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;nwapLKtbHTjy1u8+aA0X+Q==&#34;,&#xA;      &#34;name&#34;: &#34;pip&#34;,&#xA;      &#34;version&#34;: &#34;22.3.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.22.3.1.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;oH9T0w9ZyXDCGJ6Np6n1Iw==&#34;: {&#xA;      &#34;id&#34;: &#34;oH9T0w9ZyXDCGJ6Np6n1Iw==&#34;,&#xA;      &#34;name&#34;: &#34;init-system-helpers&#34;,&#xA;      &#34;version&#34;: &#34;1.60&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;init-system-helpers&#34;,&#xA;        &#34;version&#34;: &#34;1.60&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ozJ983JkaV259+RUbqutzw==&#34;: {&#xA;      &#34;id&#34;: &#34;ozJ983JkaV259+RUbqutzw==&#34;,&#xA;      &#34;name&#34;: &#34;dash&#34;,&#xA;      &#34;version&#34;: &#34;0.5.11+git20200708+dd9ef66-5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dash&#34;,&#xA;        &#34;version&#34;: &#34;0.5.11+git20200708+dd9ef66-5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;p+J9YgA22NC8PDODpTSxgw==&#34;: {&#xA;      &#34;id&#34;: &#34;p+J9YgA22NC8PDODpTSxgw==&#34;,&#xA;      &#34;name&#34;: &#34;libidn2-0&#34;,&#xA;      &#34;version&#34;: &#34;2.3.0-5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libidn2&#34;,&#xA;        &#34;version&#34;: &#34;2.3.0-5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pHAWej2qVWZtoCQ5DGoRcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pHAWej2qVWZtoCQ5DGoRcQ==&#34;,&#xA;      &#34;name&#34;: &#34;tzdata&#34;,&#xA;      &#34;version&#34;: &#34;2021a-1+deb11u8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tzdata&#34;,&#xA;        &#34;version&#34;: &#34;2021a-1+deb11u8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pZoLgWqHDgjhYQPevrtwdg==&#34;: {&#xA;      &#34;id&#34;: &#34;pZoLgWqHDgjhYQPevrtwdg==&#34;,&#xA;      &#34;name&#34;: &#34;libss2&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;q78XIEiJs5tQHLZtjoU3Fg==&#34;: {&#xA;      &#34;id&#34;: &#34;q78XIEiJs5tQHLZtjoU3Fg==&#34;,&#xA;      &#34;name&#34;: &#34;adduser&#34;,&#xA;      &#34;version&#34;: &#34;3.118&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;adduser&#34;,&#xA;        &#34;version&#34;: &#34;3.118&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qN2BSWBeEFRJnExMNJ1S0A==&#34;: {&#xA;      &#34;id&#34;: &#34;qN2BSWBeEFRJnExMNJ1S0A==&#34;,&#xA;      &#34;name&#34;: &#34;libsqlite3-0&#34;,&#xA;      &#34;version&#34;: &#34;3.34.1-3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;3.34.1-3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qrPZzwjmppjOiQbrGk5IQA==&#34;: {&#xA;      &#34;id&#34;: &#34;qrPZzwjmppjOiQbrGk5IQA==&#34;,&#xA;      &#34;name&#34;: &#34;libgssapi-krb5-2&#34;,&#xA;      &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rJ4UB7yOdBPwgrk5WLwIQw==&#34;: {&#xA;      &#34;id&#34;: &#34;rJ4UB7yOdBPwgrk5WLwIQw==&#34;,&#xA;      &#34;name&#34;: &#34;libhogweed6&#34;,&#xA;      &#34;version&#34;: &#34;3.7.3-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nettle&#34;,&#xA;        &#34;version&#34;: &#34;3.7.3-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rUyBCRoo9C2erJrGUkvuDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rUyBCRoo9C2erJrGUkvuDQ==&#34;,&#xA;      &#34;name&#34;: &#34;libtirpc3&#34;,&#xA;      &#34;version&#34;: &#34;1.3.1-1+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtirpc&#34;,&#xA;        &#34;version&#34;: &#34;1.3.1-1+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;s66OGd0F2Pbemhmyrg2R9w==&#34;: {&#xA;      &#34;id&#34;: &#34;s66OGd0F2Pbemhmyrg2R9w==&#34;,&#xA;      &#34;name&#34;: &#34;libsystemd0&#34;,&#xA;      &#34;version&#34;: &#34;247.3-7+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;247.3-7+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sU05gaIadSYQd4+DxTnInw==&#34;: {&#xA;      &#34;id&#34;: &#34;sU05gaIadSYQd4+DxTnInw==&#34;,&#xA;      &#34;name&#34;: &#34;libacl1&#34;,&#xA;      &#34;version&#34;: &#34;2.2.53-10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;acl&#34;,&#xA;        &#34;version&#34;: &#34;2.2.53-10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sXwy5mmgqLM9WC30BdKwTA==&#34;: {&#xA;      &#34;id&#34;: &#34;sXwy5mmgqLM9WC30BdKwTA==&#34;,&#xA;      &#34;name&#34;: &#34;readline-common&#34;,&#xA;      &#34;version&#34;: &#34;8.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;readline&#34;,&#xA;        &#34;version&#34;: &#34;8.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tNSJ6slY9zv+TZ6de2MVDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;tNSJ6slY9zv+TZ6de2MVDQ==&#34;,&#xA;      &#34;name&#34;: &#34;liblzma5&#34;,&#xA;      &#34;version&#34;: &#34;5.2.5-2.1~deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz-utils&#34;,&#xA;        &#34;version&#34;: &#34;5.2.5-2.1~deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tYADP/V07/lE8Qno1R/hhg==&#34;: {&#xA;      &#34;id&#34;: &#34;tYADP/V07/lE8Qno1R/hhg==&#34;,&#xA;      &#34;name&#34;: &#34;libgcc-s1&#34;,&#xA;      &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-10&#34;,&#xA;        &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uRB+svwXXxpR9DkvUVmAUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;uRB+svwXXxpR9DkvUVmAUQ==&#34;,&#xA;      &#34;name&#34;: &#34;werkzeug&#34;,&#xA;      &#34;version&#34;: &#34;3.1.8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.3.1.8.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uXsuLx/plg6mDddGlE/9EA==&#34;: {&#xA;      &#34;id&#34;: &#34;uXsuLx/plg6mDddGlE/9EA==&#34;,&#xA;      &#34;name&#34;: &#34;libxxhash0&#34;,&#xA;      &#34;version&#34;: &#34;0.8.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xxhash&#34;,&#xA;        &#34;version&#34;: &#34;0.8.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vqKK+x/7cGHNjLr4L7x4uQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vqKK+x/7cGHNjLr4L7x4uQ==&#34;,&#xA;      &#34;name&#34;: &#34;libdb5.3&#34;,&#xA;      &#34;version&#34;: &#34;5.3.28+dfsg1-0.8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;db5.3&#34;,&#xA;        &#34;version&#34;: &#34;5.3.28+dfsg1-0.8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wkuBBC4B84P3b4K0fGF0OQ==&#34;: {&#xA;      &#34;id&#34;: &#34;wkuBBC4B84P3b4K0fGF0OQ==&#34;,&#xA;      &#34;name&#34;: &#34;util-linux&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xaMEpa2lawXi7R9jqzX8hA==&#34;: {&#xA;      &#34;id&#34;: &#34;xaMEpa2lawXi7R9jqzX8hA==&#34;,&#xA;      &#34;name&#34;: &#34;findutils&#34;,&#xA;      &#34;version&#34;: &#34;4.8.0-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;findutils&#34;,&#xA;        &#34;version&#34;: &#34;4.8.0-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yYcMjCGhY/mc+KraTEHSJg==&#34;: {&#xA;      &#34;id&#34;: &#34;yYcMjCGhY/mc+KraTEHSJg==&#34;,&#xA;      &#34;name&#34;: &#34;libkrb5-3&#34;,&#xA;      &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zL6jHnohFUDkhEaUeTlPOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zL6jHnohFUDkhEaUeTlPOQ==&#34;,&#xA;      &#34;name&#34;: &#34;sed&#34;,&#xA;      &#34;version&#34;: &#34;4.7-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sed&#34;,&#xA;        &#34;version&#34;: &#34;4.7-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zQ8wKwnOqSw7e/gsx76vLQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zQ8wKwnOqSw7e/gsx76vLQ==&#34;,&#xA;      &#34;name&#34;: &#34;debianutils&#34;,&#xA;      &#34;version&#34;: &#34;4.11.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;debianutils&#34;,&#xA;        &#34;version&#34;: &#34;4.11.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zRv/Q67g6qJWTz0qqj4+BA==&#34;: {&#xA;      &#34;id&#34;: &#34;zRv/Q67g6qJWTz0qqj4+BA==&#34;,&#xA;      &#34;name&#34;: &#34;libnsl2&#34;,&#xA;      &#34;version&#34;: &#34;1.3.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libnsl&#34;,&#xA;        &#34;version&#34;: &#34;1.3.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zV4ikAKeqBYFSvXnkFMYgg==&#34;: {&#xA;      &#34;id&#34;: &#34;zV4ikAKeqBYFSvXnkFMYgg==&#34;,&#xA;      &#34;name&#34;: &#34;libpam0g&#34;,&#xA;      &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zw9OGAXs3mWkBkmfKzbfqg==&#34;: {&#xA;      &#34;id&#34;: &#34;zw9OGAXs3mWkBkmfKzbfqg==&#34;,&#xA;      &#34;name&#34;: &#34;libapt-pkg6.0&#34;,&#xA;      &#34;version&#34;: &#34;2.2.4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;apt&#34;,&#xA;        &#34;version&#34;: &#34;2.2.4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;distributions&#34;: {&#xA;    &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;: {&#xA;      &#34;id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;      &#34;did&#34;: &#34;debian&#34;,&#xA;      &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;      &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;      &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;      &#34;version_id&#34;: &#34;11&#34;,&#xA;      &#34;arch&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;,&#xA;      &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;    }&#xA;  },&#xA;  &#34;repository&#34;: {&#xA;    &#34;4cb23620-3eb6-4784-9563-fbc7ef0bd7bb&#34;: {&#xA;      &#34;id&#34;: &#34;4cb23620-3eb6-4784-9563-fbc7ef0bd7bb&#34;,&#xA;      &#34;name&#34;: &#34;pypi&#34;,&#xA;      &#34;uri&#34;: &#34;https://pypi.org/simple&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;environments&#34;: {&#xA;    &#34;+GDQTbek1zYvATiVR/wBCA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;+aaqENN9U+Kuxcb1tQ8Utg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;+ol9cHiNc+RWiD7Kw3TLCg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;05vApGRmP6ko1S0ji87IIQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;0jMyX7UCIuSpntMN1r7Ofg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;1jyJPCL93kiEbfmNKeyz3g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:f5adaff7db1ec9a20f6a98872b33de25d280dbd99bce7996e9fbd6f3aa6777a9&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;4cb23620-3eb6-4784-9563-fbc7ef0bd7bb&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;2MObxiEVNllmUEzdVZM5qw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;3f992oeEQfSQxRA0nlq8Wg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;4672uZtn8TnHDEzWVyhfjw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;4jCPzhS6OWt4agz9d/cfTw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;5zxxTA220k9gPCegfDHkag==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;7a3yla6TRFZrhmAreU7f8Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;8alfBYUr5uWbAyB5PrY8Hg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;9snKXrH4dQy2IXHQ01Lg0A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Akbft1KN+9FKNhh1tM25eA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;BJL42acLPAR8bEnmM1Z3mg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;CBzoMmlXBcyP54HOnauO0g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;CpILSbg3p6D7Gsp8sCW1Rg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;D0G6c/ML9XX4eoGHgx1jeQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;DY5Co0gkGtbgwDlkjfJLWA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:f5adaff7db1ec9a20f6a98872b33de25d280dbd99bce7996e9fbd6f3aa6777a9&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;4cb23620-3eb6-4784-9563-fbc7ef0bd7bb&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;DtMxcnDA8Je9vAHjmzagaA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;EVGnnBfWyiVHhoIR4vEpgg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ExYxXcgoIRjAjUObwDE4jA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;FJIijlwFNqvdoVBcfTF/pg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;FOAAB3KiNsLyi03hQsjRTA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;FrUy4mOCaHm5aGT53as3JQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;G/7q+D+DsqYAVnohcyuzgQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;GGaavnLgXX31qx9chfhdOQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Gm6VA87iOnaQ0rWR6oO9eA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;HFwGHerHwgvY8vkjr3x1Pg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:f5adaff7db1ec9a20f6a98872b33de25d280dbd99bce7996e9fbd6f3aa6777a9&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;4cb23620-3eb6-4784-9563-fbc7ef0bd7bb&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;IQfQp74RcAWE7jHtQsMLHg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;IiJKm8T4olfm6rhuKayFOw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Jg2vDvx1JxyPDIrUzzR9NQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;LOfpAnA/2f7zE4SFJCrxVg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;LVHVhWoZgWwWvOspyUwb1w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;MvKvHHnD0jaLaWpyHvkhgQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;NA4G2YrIZ73fsX7d5r5rGw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;NzkVb7F31E+Vxxz3PCS6tg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;OgJFdUXRfF1Ls8u1+eOivw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;PaaRbD/FkW3JARtSKQgRcQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;PgPY5hWnihXRN45byvzY0g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;R1TkRM71ql+JWgz0VF5ESQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;RAMuXEdVU4AJ/z4aiK/NNg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;4cb23620-3eb6-4784-9563-fbc7ef0bd7bb&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;RYsqO4ROpGMzzCO5WaTrlw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;RgdwX+VC70nXZ2E527PXaA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;SWnjL4fWu+WMpxhSCWLhZQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;T5NuX1yinNyGoZNN2r9u4Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;VVXsYlCxogg17Ti1iR03Mw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;VbNyM3GfR5vEmJdFAiKqrA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Wi4oa03apqVdR6okNeZiNA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ZPlAztePXX+uFLVDX2lgNQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ZWeYh81MRCu1nh3mOyptIA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bGWj1aSf0wvrecU/pdTv5A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bHkSxcl6e1quNxLGb6uX8A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bTSLWiizipO2axtmvXFuVg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;be3s5y0dx4bgsQboIoDduw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;brvvAQ6V7yp7QbUuk+W5Hg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;d4b/e0nx+/vPWuPB7oDzPw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dRfu6Up2F2Ze+gJ21oSeug==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dUT53gagQO5Ac9Bdlu5dAw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dXglURzzdbLnOf14mab1Hg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dobmrwm7aq9puvFHwNgXxw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dv3AlW8tBL4D0mEPW7/Z2Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;eF2QIdrTmJlWmjQTkhntow==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;4cb23620-3eb6-4784-9563-fbc7ef0bd7bb&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;elSR7m8uLWd/kMl2jxTm/A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;evNF5YpSAxyFV7iWv3lSVw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;fCmdLCR2Ix0ldnZL1Fa52A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;fqwKjkzVNvsxh6040zt05g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;fyM9Y65kt8cTfJv4LKF7bg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;gP9HgvZWct50Kw/hM7BCKg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;gv6x84VyNacZgvJrC59jbQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;hdNUjYIlrdEAtBWAggakAw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;i4JkQ9JgSpZVyPFWOY5Bxw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;iWqdRZmp08/Tx22qEtmjJg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;jErhz6PtXvAy/EPWJ425rA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;jKa8Us2cqGejhOc2/n5DDA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;kq4lGEwi4agkgAJAkDs9Ng==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:f5adaff7db1ec9a20f6a98872b33de25d280dbd99bce7996e9fbd6f3aa6777a9&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;4cb23620-3eb6-4784-9563-fbc7ef0bd7bb&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;krch6TQqNWzRi5F/dDkF+Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;l5lCPjtOmPM8/LLh9+NjeQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;l89yAZ/vyULk4EoaRdbg9w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:f5adaff7db1ec9a20f6a98872b33de25d280dbd99bce7996e9fbd6f3aa6777a9&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;4cb23620-3eb6-4784-9563-fbc7ef0bd7bb&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;lCjIskl1HulEHShaXtgmwQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;lvz5sq0NbU6sy/F1tg9uiQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;mlFDx1iAC2OWpmYHut2JHw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;nV87o429QBKIpM8DyOv4wg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ngOu/a+sfrdDkZtETF1mgg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;nmd/xrCD27AKRWAzA5JZCA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;npX4tBmidkxp2QJN/c3Ktw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;nwapLKtbHTjy1u8+aA0X+Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;4cb23620-3eb6-4784-9563-fbc7ef0bd7bb&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;oH9T0w9ZyXDCGJ6Np6n1Iw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ozJ983JkaV259+RUbqutzw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;p+J9YgA22NC8PDODpTSxgw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;pHAWej2qVWZtoCQ5DGoRcQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;pZoLgWqHDgjhYQPevrtwdg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;q78XIEiJs5tQHLZtjoU3Fg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;qN2BSWBeEFRJnExMNJ1S0A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;qrPZzwjmppjOiQbrGk5IQA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;rJ4UB7yOdBPwgrk5WLwIQw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;rUyBCRoo9C2erJrGUkvuDQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;s66OGd0F2Pbemhmyrg2R9w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;sU05gaIadSYQd4+DxTnInw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;sXwy5mmgqLM9WC30BdKwTA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;tNSJ6slY9zv+TZ6de2MVDQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;tYADP/V07/lE8Qno1R/hhg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;uRB+svwXXxpR9DkvUVmAUQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:f5adaff7db1ec9a20f6a98872b33de25d280dbd99bce7996e9fbd6f3aa6777a9&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;4cb23620-3eb6-4784-9563-fbc7ef0bd7bb&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;uXsuLx/plg6mDddGlE/9EA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;vqKK+x/7cGHNjLr4L7x4uQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;wkuBBC4B84P3b4K0fGF0OQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;xaMEpa2lawXi7R9jqzX8hA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;yYcMjCGhY/mc+KraTEHSJg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zL6jHnohFUDkhEaUeTlPOQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zQ8wKwnOqSw7e/gsx76vLQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zRv/Q67g6qJWTz0qqj4+BA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zV4ikAKeqBYFSvXnkFMYgg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zw9OGAXs3mWkBkmfKzbfqg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;f8f0df61-18a0-4bee-b91a-5c96e483c6a8&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ]&#xA;  },&#xA;  &#34;vulnerabilities&#34;: {&#xA;    &#34;+N61/5529gFt7RkD8ooeKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+N61/5529gFt7RkD8ooeKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0465&#34;,&#xA;      &#34;description&#34;: &#34;Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks.  Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether.  Policy processing is disabled by default but can be enabled by passing the `-policy&#39; argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0465&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u5&#34;&#xA;    },&#xA;    &#34;+x9OyXfXk9PrekfsnPKwlg==&#34;: {&#xA;      &#34;id&#34;: &#34;+x9OyXfXk9PrekfsnPKwlg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-13529&#34;,&#xA;      &#34;description&#34;: &#34;An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2020-13529&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/7UJLAHsMPxTtTxvuPgrzA==&#34;: {&#xA;      &#34;id&#34;: &#34;/7UJLAHsMPxTtTxvuPgrzA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45491&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-45491&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u6&#34;&#xA;    },&#xA;    &#34;/YwO4YLRGgF2uWU55V6+MQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/YwO4YLRGgF2uWU55V6+MQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-1010022&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \&#34;this is being treated as a non-security bug and no real threat.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-1010022&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;08pa4udz9bnA9IOsE208DA==&#34;: {&#xA;      &#34;id&#34;: &#34;08pa4udz9bnA9IOsE208DA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4039&#34;,&#xA;      &#34;description&#34;: &#34;**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains  that target AArch64 allows an attacker to exploit an existing buffer  overflow in dynamically-sized local variables in your application  without this being detected. This stack-protector failure only applies  to C99-style dynamically-sized local variables or those created using  alloca(). The stack-protector operates as intended for statically-sized  local variables.  The default behavior when the stack-protector  detects an overflow is to terminate your application, resulting in  controlled loss of availability. An attacker who can exploit a buffer  overflow without triggering the stack-protector might be able to change  program flow control to cause an uncontrolled loss of availability or to  go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4039&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-10&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;: {&#xA;      &#34;id&#34;: &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-26458&#34;,&#xA;      &#34;description&#34;: &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-26458&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0q/btA3zBEGWWmFxU7cNig==&#34;: {&#xA;      &#34;id&#34;: &#34;0q/btA3zBEGWWmFxU7cNig==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40225&#34;,&#xA;      &#34;description&#34;: &#34;In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-40225&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u8&#34;&#xA;    },&#xA;    &#34;1U/zi3CEao+52y8LKU0uvw==&#34;: {&#xA;      &#34;id&#34;: &#34;1U/zi3CEao+52y8LKU0uvw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36084&#34;,&#xA;      &#34;description&#34;: &#34;The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36084&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;1VnWeA5AZgybyD8+PiXyiw==&#34;: {&#xA;      &#34;id&#34;: &#34;1VnWeA5AZgybyD8+PiXyiw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-70873&#34;,&#xA;      &#34;description&#34;: &#34;An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-70873&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1dwwvWkARnFe67yAAGVglQ==&#34;: {&#xA;      &#34;id&#34;: &#34;1dwwvWkARnFe67yAAGVglQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31438&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \&#34;a reply denying that any of the finding was a security vulnerability.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31438&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;27BVJE6xR0Z84LzifDnFYA==&#34;: {&#xA;      &#34;id&#34;: &#34;27BVJE6xR0Z84LzifDnFYA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-48303&#34;,&#xA;      &#34;description&#34;: &#34;GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-48303&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.34+dfsg-1+deb11u1&#34;&#xA;    },&#xA;    &#34;3QDeWfKuntq5YxjjCuZXRQ==&#34;: {&#xA;      &#34;id&#34;: &#34;3QDeWfKuntq5YxjjCuZXRQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write.  Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application.  The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the BIO implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-68160&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;3Z3QMUqCN4dQV+f8cjn1eA==&#34;: {&#xA;      &#34;id&#34;: &#34;3Z3QMUqCN4dQV+f8cjn1eA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file.  Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service.  The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash.  Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial of Service. For these reasons the issue was assessed as Low severity.  The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the TimeStamp Response implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.  OpenSSL 1.0.2 is not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69420&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;3cBlPR7Tm4BIC/+wflldAg==&#34;: {&#xA;      &#34;id&#34;: &#34;3cBlPR7Tm4BIC/+wflldAg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12243&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-12243&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u7&#34;&#xA;    },&#xA;    &#34;5+uzHCKkmvMK8jl2uJkFqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5+uzHCKkmvMK8jl2uJkFqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32777&#34;,&#xA;      &#34;description&#34;: &#34;libexpat before 2.7.5 allows an infinite loop while parsing DTD content.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-32777&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;: {&#xA;      &#34;id&#34;: &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-37370&#34;,&#xA;      &#34;description&#34;: &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-37370&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u5&#34;&#xA;    },&#xA;    &#34;5Cmp5KJXv+nVwwcs5/Kz7w==&#34;: {&#xA;      &#34;id&#34;: &#34;5Cmp5KJXv+nVwwcs5/Kz7w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-50602&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-50602&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u7&#34;&#xA;    },&#xA;    &#34;5IA1PesIyj05J2Yx0YB4tQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5IA1PesIyj05J2Yx0YB4tQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;ECHO-3d34-cec5-cf72&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-23T11:00:38Z&#34;,&#xA;      &#34;links&#34;: &#34;https://advisory.echohq.com/cve/CVE-2026-24049&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;wheel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=0.45.1%2Becho.1&#34;&#xA;    },&#xA;    &#34;5OqCQlhu6kV+tAsgGEGuwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5OqCQlhu6kV+tAsgGEGuwQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27171&#34;,&#xA;      &#34;description&#34;: &#34;zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-27171&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5rGwN3bKZLMvxcM/W4jj+A==&#34;: {&#xA;      &#34;id&#34;: &#34;5rGwN3bKZLMvxcM/W4jj+A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;      &#34;description&#34;: &#34;systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-29111&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u8&#34;&#xA;    },&#xA;    &#34;6j23t/n6B77cQMxfCeLKzA==&#34;: {&#xA;      &#34;id&#34;: &#34;6j23t/n6B77cQMxfCeLKzA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12133&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-12133&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;4.16.0-2+deb11u2&#34;&#xA;    },&#xA;    &#34;6jg3v7lJ92IZCQpZydR2sA==&#34;: {&#xA;      &#34;id&#34;: &#34;6jg3v7lJ92IZCQpZydR2sA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28757&#34;,&#xA;      &#34;description&#34;: &#34;libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-28757&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7DtFnnE8FjIpCQKunutpeg==&#34;: {&#xA;      &#34;id&#34;: &#34;7DtFnnE8FjIpCQKunutpeg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-16156&#34;,&#xA;      &#34;description&#34;: &#34;CPAN 2.28 allows Signature Verification Bypass.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2020-16156&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;5.32.1-4+deb11u4&#34;&#xA;    },&#xA;    &#34;9JIazCQjSvYhpG9KE6d7Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;9JIazCQjSvYhpG9KE6d7Pg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;The regcomp function in the GNU C library version from 2.4 to 2.41 is  subject to a double free if some previous allocation fails. It can be  accomplished either by a malloc failure or by using an interposed malloc  that injects random malloc failures. The double free can allow buffer  manipulation depending of how the regex is constructed. This issue  affects all architectures and ABIs supported by the GNU C library.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-8058&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9ThuL3zLKpmduvKpiDZ60w==&#34;: {&#xA;      &#34;id&#34;: &#34;9ThuL3zLKpmduvKpiDZ60w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-24515&#34;,&#xA;      &#34;description&#34;: &#34;In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-24515&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9sNDKQtqg7Z3gJr//JQlvg==&#34;: {&#xA;      &#34;id&#34;: &#34;9sNDKQtqg7Z3gJr//JQlvg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32990&#34;,&#xA;      &#34;description&#34;: &#34;A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-32990&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u8&#34;&#xA;    },&#xA;    &#34;9xk1p07t4ZV999E3HyfhVA==&#34;: {&#xA;      &#34;id&#34;: &#34;9xk1p07t4ZV999E3HyfhVA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5704&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tar. A remote attacker could exploit this vulnerability by crafting a malicious archive, leading to hidden file injection with fully attacker-controlled content. This bypasses pre-extraction inspection mechanisms, potentially allowing an attacker to introduce malicious files onto a system without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-5704&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ANq7+l7+5U6IDt9eU02u5w==&#34;: {&#xA;      &#34;id&#34;: &#34;ANq7+l7+5U6IDt9eU02u5w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3219&#34;,&#xA;      &#34;description&#34;: &#34;GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-3219&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ASrdm9EROwWp9Ip2w7HH5w==&#34;: {&#xA;      &#34;id&#34;: &#34;ASrdm9EROwWp9Ip2w7HH5w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3821&#34;,&#xA;      &#34;description&#34;: &#34;An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-3821&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u2&#34;&#xA;    },&#xA;    &#34;AvPdNumiwGnBie+lo1du3A==&#34;: {&#xA;      &#34;id&#34;: &#34;AvPdNumiwGnBie+lo1du3A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31486&#34;,&#xA;      &#34;description&#34;: &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31486&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;B78vSIll2muNDyY3F7urzw==&#34;: {&#xA;      &#34;id&#34;: &#34;B78vSIll2muNDyY3F7urzw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34743&#34;,&#xA;      &#34;description&#34;: &#34;XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version 5.8.3, if lzma_index_decoder() was used to decode an Index that contained no Records, the resulting lzma_index was left in a state where where a subsequent lzma_index_append() would allocate too little memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-34743&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz-utils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8941&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a \&#34;complete\&#34; fix for CVE-2025-6020.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-8941&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BtqRPc7F47wJWygPNOxw1w==&#34;: {&#xA;      &#34;id&#34;: &#34;BtqRPc7F47wJWygPNOxw1w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32778&#34;,&#xA;      &#34;description&#34;: &#34;libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after an earlier ouf-of-memory condition.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-32778&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BxMnseA9J6OW2RWxSrlbyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;BxMnseA9J6OW2RWxSrlbyQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36690&#34;,&#xA;      &#34;description&#34;: &#34;A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36690&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.34.1-3+deb11u1&#34;&#xA;    },&#xA;    &#34;CaLsKNvkpKlxKVBlUnje9Q==&#34;: {&#xA;      &#34;id&#34;: &#34;CaLsKNvkpKlxKVBlUnje9Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36087&#34;,&#xA;      &#34;description&#34;: &#34;The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36087&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;CfS0L/tTata7W0FXXtQ4EQ==&#34;: {&#xA;      &#34;id&#34;: &#34;CfS0L/tTata7W0FXXtQ4EQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4438&#34;,&#xA;      &#34;description&#34;: &#34;Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library&#39;s DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-4438&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CtYegggqGbMfg16G/qfITQ==&#34;: {&#xA;      &#34;id&#34;: &#34;CtYegggqGbMfg16G/qfITQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2013-4235&#34;,&#xA;      &#34;description&#34;: &#34;shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2013-4235&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DJOf0vCfrT4GvRr/tBJhbg==&#34;: {&#xA;      &#34;id&#34;: &#34;DJOf0vCfrT4GvRr/tBJhbg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;nscd: netgroup cache may terminate daemon on memory allocation failure  The Name Service Cache Daemon&#39;s (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a denial of service to the clients.  The flaw was introduced in glibc 2.15 when the cache was added to nscd.  This vulnerability is only present in the nscd binary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-33601&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u10&#34;&#xA;    },&#xA;    &#34;DRKFIYYNzLumACBV1CW/rw==&#34;: {&#xA;      &#34;id&#34;: &#34;DRKFIYYNzLumACBV1CW/rw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-35737&#34;,&#xA;      &#34;description&#34;: &#34;SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-35737&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DS2nhayHHtinLlFzZheSwg==&#34;: {&#xA;      &#34;id&#34;: &#34;DS2nhayHHtinLlFzZheSwg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66382&#34;,&#xA;      &#34;description&#34;: &#34;In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-66382&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DfxJWBpJUY1aHu0ZUSilDg==&#34;: {&#xA;      &#34;id&#34;: &#34;DfxJWBpJUY1aHu0ZUSilDg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-6829&#34;,&#xA;      &#34;description&#34;: &#34;cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt&#39;s ElGamal implementation.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2018-6829&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DkvPjH9ZM3anH55rsU+i3w==&#34;: {&#xA;      &#34;id&#34;: &#34;DkvPjH9ZM3anH55rsU+i3w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-41080&#34;,&#xA;      &#34;description&#34;: &#34;libexpat before 2.7.6 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-41080&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ELw1b1vO2YOtV7qNQijgCw==&#34;: {&#xA;      &#34;id&#34;: &#34;ELw1b1vO2YOtV7qNQijgCw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4437&#34;,&#xA;      &#34;description&#34;: &#34;Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library&#39;s DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-4437&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EYo03ICovWfCjw2cKpwx4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;EYo03ICovWfCjw2cKpwx4Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2005-2541&#34;,&#xA;      &#34;description&#34;: &#34;Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2005-2541&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EajCJi704nU1+LqESNMC1w==&#34;: {&#xA;      &#34;id&#34;: &#34;EajCJi704nU1+LqESNMC1w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0727&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack  Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly.  A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue.  OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass().  We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant.  The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-0727&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;EvarhwbaAMrD3meGYFByGg==&#34;: {&#xA;      &#34;id&#34;: &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-50495&#34;,&#xA;      &#34;description&#34;: &#34;NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-50495&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;F0zkrLGlbsix59P9mqoAOg==&#34;: {&#xA;      &#34;id&#34;: &#34;F0zkrLGlbsix59P9mqoAOg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-30258&#34;,&#xA;      &#34;description&#34;: &#34;In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a \&#34;verification DoS.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-30258&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;G45dR+E8Wb+bEhCdwuqUDg==&#34;: {&#xA;      &#34;id&#34;: &#34;G45dR+E8Wb+bEhCdwuqUDg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-20838&#34;,&#xA;      &#34;description&#34;: &#34;libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \\X or \\R has more than one fixed quantifier, a related issue to CVE-2019-20454.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-20838&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GPLYq884jQKVksfMc+b7OQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GPLYq884jQKVksfMc+b7OQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-1304&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-1304&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.46.2-2+deb11u1&#34;&#xA;    },&#xA;    &#34;GRlufCZFwHNK64OQNCFIcg==&#34;: {&#xA;      &#34;id&#34;: &#34;GRlufCZFwHNK64OQNCFIcg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2013-4392&#34;,&#xA;      &#34;description&#34;: &#34;systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2013-4392&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GezxxUl3QPWUTitg/VHmlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GezxxUl3QPWUTitg/VHmlQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-1010024&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \&#34;this is being treated as a non-security bug and no real threat.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-1010024&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GmBi7n85v8sX6ItoMSgvlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GmBi7n85v8sX6ItoMSgvlQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write.  Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code.  Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy.  The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-9230&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u4&#34;&#xA;    },&#xA;    &#34;HuTBrVHKx7uaMtQjiqifKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;HuTBrVHKx7uaMtQjiqifKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0567&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-0567&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u5&#34;&#xA;    },&#xA;    &#34;IJPGr43VMeLym6tW3EWgdg==&#34;: {&#xA;      &#34;id&#34;: &#34;IJPGr43VMeLym6tW3EWgdg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-8176&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-8176&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IvA5abshk33BAuuBar/pVQ==&#34;: {&#xA;      &#34;id&#34;: &#34;IvA5abshk33BAuuBar/pVQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45492&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-45492&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u6&#34;&#xA;    },&#xA;    &#34;IwuADin5bagOGQErETBgWw==&#34;: {&#xA;      &#34;id&#34;: &#34;IwuADin5bagOGQErETBgWw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4046&#34;,&#xA;      &#34;description&#34;: &#34;The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application.    This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-4046&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Jl0PQIP9L3ufSvQ2j71iww==&#34;: {&#xA;      &#34;id&#34;: &#34;Jl0PQIP9L3ufSvQ2j71iww==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-r9hx-vwmv-q579&#34;,&#xA;      &#34;description&#34;: &#34;pypa/setuptools vulnerable to Regular Expression Denial of Service (ReDoS)&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-23T00:30:23Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2022-40897 https://github.com/pypa/setuptools/issues/3659 https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be https://setuptools.pypa.io/en/latest https://security.netapp.com/advisory/ntap-20240621-0006 https://security.netapp.com/advisory/ntap-20230214-0001 https://pyup.io/vulnerabilities/CVE-2022-40897/52495 https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R https://lists.debian.org/debian-lts-announce/2024/09/msg00018.html https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1 https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200 https://github.com/pypa/setuptools https://github.com/pypa/advisory-database/tree/main/vulns/setuptools/PYSEC-2022-43012.yaml&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=65.5.1&#34;&#xA;    },&#xA;    &#34;KLrAiYCJHdmWQ2RaqUywlA==&#34;: {&#xA;      &#34;id&#34;: &#34;KLrAiYCJHdmWQ2RaqUywlA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4304&#34;,&#xA;      &#34;description&#34;: &#34;A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE.  For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-4304&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;KZ3Jt7zkiM272dGLstI4XA==&#34;: {&#xA;      &#34;id&#34;: &#34;KZ3Jt7zkiM272dGLstI4XA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2013-0340&#34;,&#xA;      &#34;description&#34;: &#34;expat before version 2.4.0 does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue.  NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2013-0340&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KaoEuixR8E5nnpGZ1pG25w==&#34;: {&#xA;      &#34;id&#34;: &#34;KaoEuixR8E5nnpGZ1pG25w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0553&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-0553&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u5&#34;&#xA;    },&#xA;    &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;: {&#xA;      &#34;id&#34;: &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-10041&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-10041&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KwgIGMm765S+zvIBAwM9+g==&#34;: {&#xA;      &#34;id&#34;: &#34;KwgIGMm765S+zvIBAwM9+g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4899&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-4899&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libzstd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LD4zPH3rZZkbSPN5ojHClA==&#34;: {&#xA;      &#34;id&#34;: &#34;LD4zPH3rZZkbSPN5ojHClA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;TEMP-0628843-DBAD28&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MDmWztEMrTY+VyVp5c+Fvw==&#34;: {&#xA;      &#34;id&#34;: &#34;MDmWztEMrTY+VyVp5c+Fvw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;TEMP-0841856-B18BAF&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/TEMP-0841856-B18BAF&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bash&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MXRm//dBCnWFem5zffvqmA==&#34;: {&#xA;      &#34;id&#34;: &#34;MXRm//dBCnWFem5zffvqmA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3715&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-3715&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bash&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MYYkxlB4Ank1zsdIh41apg==&#34;: {&#xA;      &#34;id&#34;: &#34;MYYkxlB4Ank1zsdIh41apg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-2961&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u9&#34;&#xA;    },&#xA;    &#34;MdrEi+/OrLlW3zDrheID2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;MdrEi+/OrLlW3zDrheID2Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59375&#34;,&#xA;      &#34;description&#34;: &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-59375&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Mmh4dm/jzK4QVSJqQVsCDw==&#34;: {&#xA;      &#34;id&#34;: &#34;Mmh4dm/jzK4QVSJqQVsCDw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data.  Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attributes() function can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service.  The function PKCS7_digest_from_attributes() accesses the message digest attribute value without validating its type. When the type is not V_ASN1_OCTET_STRING, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash.  Exploiting this vulnerability requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of the exploit is just a Denial of Service, the PKCS7 API is legacy and applications should be using the CMS API instead. For these reasons the issue was assessed as Low severity.  The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#7 parsing implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-22796&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;Mnnh2CmlXNNRCBXvqdG9ig==&#34;: {&#xA;      &#34;id&#34;: &#34;Mnnh2CmlXNNRCBXvqdG9ig==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28387&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: An uncommon configuration of clients performing DANE TLSA-based server authentication, when paired with uncommon server DANE TLSA records, may result in a use-after-free and/or double-free on the client side.  Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code.  However, the issue only affects clients that make use of TLSA records with both the PKIX-TA(0/PKIX-EE(1) certificate usages and the DANE-TA(2) certificate usage.  By far the most common deployment of DANE is in SMTP MTAs for which RFC7672 recommends that clients treat as &#39;unusable&#39; any TLSA records that have the PKIX certificate usages.  These SMTP (or other similar) clients are not vulnerable to this issue.  Conversely, any clients that support only the PKIX usages, and ignore the DANE-TA(2) usage are also not vulnerable.  The client would also need to be communicating with a server that publishes a TLSA RRset with both types of TLSA records.  No FIPS modules are affected by this issue, the problem code is outside the FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-28387&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Mxv06g47iCk7QIqi7Xbojw==&#34;: {&#xA;      &#34;id&#34;: &#34;Mxv06g47iCk7QIqi7Xbojw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45853&#34;,&#xA;      &#34;description&#34;: &#34;MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-45853&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NYWveHKKsIYIKl+vE8UEhw==&#34;: {&#xA;      &#34;id&#34;: &#34;NYWveHKKsIYIKl+vE8UEhw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;TEMP-0517018-A83CE6&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/TEMP-0517018-A83CE6&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sysvinit&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;: {&#xA;      &#34;id&#34;: &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22365&#34;,&#xA;      &#34;description&#34;: &#34;linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-22365&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.4.0-9+deb11u2&#34;&#xA;    },&#xA;    &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;: {&#xA;      &#34;id&#34;: &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-26461&#34;,&#xA;      &#34;description&#34;: &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-26461&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;: {&#xA;      &#34;id&#34;: &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3576&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-3576&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u7&#34;&#xA;    },&#xA;    &#34;OTqcMsspao5I6JZMETZ06w==&#34;: {&#xA;      &#34;id&#34;: &#34;OTqcMsspao5I6JZMETZ06w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0915&#34;,&#xA;      &#34;description&#34;: &#34;Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library&#39;s DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-0915&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;P4mYk7npVU6t91mlbAb8QA==&#34;: {&#xA;      &#34;id&#34;: &#34;P4mYk7npVU6t91mlbAb8QA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2511&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions  Impact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service  This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation.  This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients.  The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-2511&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;: {&#xA;      &#34;id&#34;: &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28085&#34;,&#xA;      &#34;description&#34;: &#34;wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users&#39; terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-28085&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.36.1-8+deb11u2&#34;&#xA;    },&#xA;    &#34;PUY4fn57nsAU2qBLtgRtdw==&#34;: {&#xA;      &#34;id&#34;: &#34;PUY4fn57nsAU2qBLtgRtdw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-6vgw-5pg2-w6jp&#34;,&#xA;      &#34;description&#34;: &#34;pip Path Traversal vulnerability&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-02T15:30:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2026-1703 https://github.com/pypa/pip/pull/13777 https://github.com/pypa/pip/commit/8e227a9be4faa9594e05d02ca05a413a2a4e7735 https://github.com/pypa/pip https://mail.python.org/archives/list/security-announce@python.org/thread/WIEA34D4TABF2UNQJAOMXKCICSPBE2DJ&#34;,&#xA;      &#34;severity&#34;: &#34;LOW&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=26.0&#34;&#xA;    },&#xA;    &#34;Pj9V3uC2c9o+P6lTpzzGeA==&#34;: {&#xA;      &#34;id&#34;: &#34;Pj9V3uC2c9o+P6lTpzzGeA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;PYSEC-2025-49&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-17T16:15:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf https://lists.debian.org/debian-lts-announce/2025/05/msg00035.html https://github.com/pypa/setuptools/issues/4946 https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=78.1.1&#34;&#xA;    },&#xA;    &#34;QEROZuK4q+zt8UbP6ZV8wg==&#34;: {&#xA;      &#34;id&#34;: &#34;QEROZuK4q+zt8UbP6ZV8wg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: When using the low-level OCB API directly with AES-NI or\u003cbr\u003eother hardware-accelerated code paths, inputs whose length is not a multiple\u003cbr\u003eof 16 bytes can leave the final partial block unencrypted and unauthenticated.\u003cbr\u003e\u003cbr\u003eImpact summary: The trailing 1-15 bytes of a message may be exposed in\u003cbr\u003ecleartext on encryption and are not covered by the authentication tag,\u003cbr\u003eallowing an attacker to read or tamper with those bytes without detection.\u003cbr\u003e\u003cbr\u003eThe low-level OCB encrypt and decrypt routines in the hardware-accelerated\u003cbr\u003estream path process full 16-byte blocks but do not advance the input/output\u003cbr\u003epointers. The subsequent tail-handling code then operates on the original\u003cbr\u003ebase pointers, effectively reprocessing the beginning of the buffer while\u003cbr\u003eleaving the actual trailing bytes unprocessed. The authentication checksum\u003cbr\u003ealso excludes the true tail bytes.\u003cbr\u003e\u003cbr\u003eHowever, typical OpenSSL consumers using EVP are not affected because the\u003cbr\u003ehigher-level EVP and provider OCB implementations split inputs so that full\u003cbr\u003eblocks and trailing partial blocks are processed in separate calls, avoiding\u003cbr\u003ethe problematic code path. Additionally, TLS does not use OCB ciphersuites.\u003cbr\u003eThe vulnerability only affects applications that call the low-level\u003cbr\u003eCRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with\u003cbr\u003enon-block-aligned lengths in a single call on hardware-accelerated builds.\u003cbr\u003eFor these reasons the issue was assessed as Low severity.\u003cbr\u003e\u003cbr\u003eThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected\u003cbr\u003eby this issue, as OCB mode is not a FIPS-approved algorithm.\u003cbr\u003e\u003cbr\u003eOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\u003cbr\u003e\u003cbr\u003eOpenSSL 1.0.2 is not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69418&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;QGq5D5QwQKPerzYOBVoSsg==&#34;: {&#xA;      &#34;id&#34;: &#34;QGq5D5QwQKPerzYOBVoSsg==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-cx63-2mw6-8hw5&#34;,&#xA;      &#34;description&#34;: &#34;setuptools vulnerable to Command Injection via package URL&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-15T03:30:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2024-6345 https://github.com/pypa/setuptools/pull/4332 https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0 https://github.com/pypa/setuptools https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5 https://lists.debian.org/debian-lts-announce/2024/09/msg00018.html&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=70.0.0&#34;&#xA;    },&#xA;    &#34;Qd2XnJZ3qaQ3AbyDXUaR2A==&#34;: {&#xA;      &#34;id&#34;: &#34;Qd2XnJZ3qaQ3AbyDXUaR2A==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;PYSEC-2022-43012&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-23T00:15:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200 https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/ https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1 https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be https://pyup.io/vulnerabilities/CVE-2022-40897/52495/&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=65.5.1&#34;&#xA;    },&#xA;    &#34;QopvyNp/5Ata9NdAUhFygw==&#34;: {&#xA;      &#34;id&#34;: &#34;QopvyNp/5Ata9NdAUhFygw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5278&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNU Coreutils. The sort utility&#39;s begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-5278&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SNR1VT02i1HBHxqGRTeBAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;SNR1VT02i1HBHxqGRTeBAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9820&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-9820&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u9&#34;&#xA;    },&#xA;    &#34;T2SiDOPpMK0bU0Y0qkOm1A==&#34;: {&#xA;      &#34;id&#34;: &#34;T2SiDOPpMK0bU0Y0qkOm1A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-1010025&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor&#39;s position is \&#34;ASLR bypass itself is not a vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-1010025&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;: {&#xA;      &#34;id&#34;: &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-24528&#34;,&#xA;      &#34;description&#34;: &#34;In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-24528&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u6&#34;&#xA;    },&#xA;    &#34;TN8d5UGyH2D+dtBNYjKyKg==&#34;: {&#xA;      &#34;id&#34;: &#34;TN8d5UGyH2D+dtBNYjKyKg==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;ECHO-ffe1-1d3c-d9bc&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-25T13:30:24Z&#34;,&#xA;      &#34;links&#34;: &#34;https://advisory.echohq.com/cve/CVE-2025-8869&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=25.2%2Becho.1&#34;&#xA;    },&#xA;    &#34;Tcuyjettc5LT9G5wj3mSxw==&#34;: {&#xA;      &#34;id&#34;: &#34;Tcuyjettc5LT9G5wj3mSxw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4450&#34;,&#xA;      &#34;description&#34;: &#34;The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \&#34;name\&#34; (e.g. \&#34;CERTIFICATE\&#34;), any header data and the payload data. If the function succeeds then the \&#34;name_out\&#34;, \&#34;header\&#34; and \&#34;data\&#34; arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack.  The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected.  These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0.  The OpenSSL asn1parse command line application is also impacted by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-4450&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;: {&#xA;      &#34;id&#34;: &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6141&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6141&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;U3JbUhrT2SqWNuYU5d13cQ==&#34;: {&#xA;      &#34;id&#34;: &#34;U3JbUhrT2SqWNuYU5d13cQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-33560&#34;,&#xA;      &#34;description&#34;: &#34;Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-33560&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;U5598afGvRaltva6Rjqnug==&#34;: {&#xA;      &#34;id&#34;: &#34;U5598afGvRaltva6Rjqnug==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4105&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-4105&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u8&#34;&#xA;    },&#xA;    &#34;Ud6njM/DPIrfSPiFct82Lw==&#34;: {&#xA;      &#34;id&#34;: &#34;Ud6njM/DPIrfSPiFct82Lw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-52426&#34;,&#xA;      &#34;description&#34;: &#34;libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-52426&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UdV1OleGh/0MAkug0ZAlcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;UdV1OleGh/0MAkug0ZAlcQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25210&#34;,&#xA;      &#34;description&#34;: &#34;In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-25210&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VzolVkOS5HseGzVTLzDMfA==&#34;: {&#xA;      &#34;id&#34;: &#34;VzolVkOS5HseGzVTLzDMfA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39804&#34;,&#xA;      &#34;description&#34;: &#34;In GNU tar before 1.35, mishandled extension attributes in a PAX archive can lead to an application crash in xheader.c.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-39804&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.34+dfsg-1+deb11u1&#34;&#xA;    },&#xA;    &#34;WCGqond4znYKCRcm4xyPrg==&#34;: {&#xA;      &#34;id&#34;: &#34;WCGqond4znYKCRcm4xyPrg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2007-5686&#34;,&#xA;      &#34;description&#34;: &#34;initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts.  NOTE: because sshd detects the insecure permissions and does not log certain events, this also prevents sshd from logging failed authentication attempts by remote attackers.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2007-5686&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WG/hQnqUufOh6/5/mlRi/Q==&#34;: {&#xA;      &#34;id&#34;: &#34;WG/hQnqUufOh6/5/mlRi/Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31439&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \&#34;a reply denying that any of the finding was a security vulnerability.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31439&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WHvU12ysgz1Ai1y1KSOiLA==&#34;: {&#xA;      &#34;id&#34;: &#34;WHvU12ysgz1Ai1y1KSOiLA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;nscd: Stack-based buffer overflow in netgroup cache  If the Name Service Cache Daemon&#39;s (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow.  This flaw was introduced in glibc 2.15 when the cache was added to nscd.  This vulnerability is only present in the nscd binary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-33599&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u10&#34;&#xA;    },&#xA;    &#34;WWnQMI7f7f75SgC9Dcl+QQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WWnQMI7f7f75SgC9Dcl+QQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;TEMP-0290435-0B57B5&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/TEMP-0290435-0B57B5&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WcYPrwv9PSVoVoof5MRsxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WcYPrwv9PSVoVoof5MRsxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;PYSEC-2023-228&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-25T18:17:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://mail.python.org/archives/list/security-announce@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL/ https://github.com/pypa/pip/pull/12306&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=23.3&#34;&#xA;    },&#xA;    &#34;WxlxRC1KqAo8Mejv03fZGA==&#34;: {&#xA;      &#34;id&#34;: &#34;WxlxRC1KqAo8Mejv03fZGA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68972&#34;,&#xA;      &#34;description&#34;: &#34;In GnuPG through 2.4.8, if a signed message has \\f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an \&#34;invalid armor\&#34; message is printed during verification). This is related to use of \\f as a marker to denote truncation of a long plaintext line.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-68972&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Xce4H7xsVfrtYV2aXED7xA==&#34;: {&#xA;      &#34;id&#34;: &#34;Xce4H7xsVfrtYV2aXED7xA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-18018&#34;,&#xA;      &#34;description&#34;: &#34;In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX \&#34;-R -L\&#34; options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-18018&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XtT5+z5+yMbpdsyfkLItzA==&#34;: {&#xA;      &#34;id&#34;: &#34;XtT5+z5+yMbpdsyfkLItzA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6395&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6395&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u8&#34;&#xA;    },&#xA;    &#34;Y++3+aMTeU3vX7BI4/zG6w==&#34;: {&#xA;      &#34;id&#34;: &#34;Y++3+aMTeU3vX7BI4/zG6w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14831&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-14831&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u9&#34;&#xA;    },&#xA;    &#34;Y4A2Zm5xcsipvfluZVH5fA==&#34;: {&#xA;      &#34;id&#34;: &#34;Y4A2Zm5xcsipvfluZVH5fA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0861&#34;,&#xA;      &#34;description&#34;: &#34;Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.  Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this.  The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument.  This limits the malicious inputs for the alignment for memalign to the range [1\u003c\u003c62+ 1, 1\u003c\u003c63] and exactly 1\u003c\u003c63 for posix_memalign and aligned_alloc.  Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice.  An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-0861&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YXTNVVKQsWY/LFuomB715g==&#34;: {&#xA;      &#34;id&#34;: &#34;YXTNVVKQsWY/LFuomB715g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13151&#34;,&#xA;      &#34;description&#34;: &#34;Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-13151&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZbWtFXr0WyByV4kCb3M6FA==&#34;: {&#xA;      &#34;id&#34;: &#34;ZbWtFXr0WyByV4kCb3M6FA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5981&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-5981&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u4&#34;&#xA;    },&#xA;    &#34;ZdGgPSEZdeQ3XJo0+ZpAXQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ZdGgPSEZdeQ3XJo0+ZpAXQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-1010023&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \&#34;this is being treated as a non-security bug and no real threat.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-1010023&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZrZi02myDWWW0L5oPQj/cg==&#34;: {&#xA;      &#34;id&#34;: &#34;ZrZi02myDWWW0L5oPQj/cg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-11164&#34;,&#xA;      &#34;description&#34;: &#34;In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-11164&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZxTVeoHgmvhWXsV+xLzphA==&#34;: {&#xA;      &#34;id&#34;: &#34;ZxTVeoHgmvhWXsV+xLzphA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4813&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;aWm6E1ULjtuw0ydmFnsI4A==&#34;: {&#xA;      &#34;id&#34;: &#34;aWm6E1ULjtuw0ydmFnsI4A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6297&#34;,&#xA;      &#34;description&#34;: &#34;It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6297&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dpkg&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;afNm575eldgXY3DOGUNdqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;afNm575eldgXY3DOGUNdqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28388&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: When a delta CRL that contains a Delta CRL Indicator extension is processed a NULL pointer dereference might happen if the required CRL Number extension is missing.  Impact summary: A NULL pointer dereference can trigger a crash which leads to a Denial of Service for an application.  When CRL processing and delta CRL processing is enabled during X.509 certificate verification, the delta CRL processing does not check whether the CRL Number extension is NULL before dereferencing it. When a malformed delta CRL file is being processed, this parameter can be NULL, causing a NULL pointer dereference.  Exploiting this issue requires the X509_V_FLAG_USE_DELTAS flag to be enabled in the verification context, the certificate being verified to contain a freshestCRL extension or the base CRL to have the EXFLAG_FRESHEST flag set, and an attacker to provide a malformed CRL to an application that processes it.  The vulnerability is limited to Denial of Service and cannot be escalated to achieve code execution or memory disclosure. For that reason the issue was assessed as Low severity according to our Security Policy.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-28388&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;aqMHDRnPT+3QNU/8tSwsog==&#34;: {&#xA;      &#34;id&#34;: &#34;aqMHDRnPT+3QNU/8tSwsog==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-9192&#34;,&#xA;      &#34;description&#34;: &#34;In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by &#39;(|)(\\\\1\\\\1)*&#39; in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-9192&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;b2D8D2g8yPwuRhswdqF0Rw==&#34;: {&#xA;      &#34;id&#34;: &#34;b2D8D2g8yPwuRhswdqF0Rw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3446&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Checking excessively long DH keys or parameters may be very slow.  Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.  The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (&#39;p&#39; parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length.  However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large.  An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack.  The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check().  Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the &#39;-check&#39; option.  The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-3446&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1v-0~deb11u1&#34;&#xA;    },&#xA;    &#34;bBymk1eoEM+tVYB+/Crz+g==&#34;: {&#xA;      &#34;id&#34;: &#34;bBymk1eoEM+tVYB+/Crz+g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28835&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the \&#34;certtool --verify-chain\&#34; command.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-28835&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u6&#34;&#xA;    },&#xA;    &#34;bNvH54V1y9cXsGaCXVwFVw==&#34;: {&#xA;      &#34;id&#34;: &#34;bNvH54V1y9cXsGaCXVwFVw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-5rjg-fvgr-3xxf&#34;,&#xA;      &#34;description&#34;: &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T16:52:43Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf https://nvd.nist.gov/vuln/detail/CVE-2025-47273 https://github.com/pypa/setuptools/issues/4946 https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b https://github.com/pypa/advisory-database/tree/main/vulns/setuptools/PYSEC-2025-49.yaml https://github.com/pypa/setuptools https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88 https://lists.debian.org/debian-lts-announce/2025/05/msg00035.html&#34;,&#xA;      &#34;severity&#34;: &#34;HIGH&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=78.1.1&#34;&#xA;    },&#xA;    &#34;bX7iB3AnaRh9Z+itWa3Xyw==&#34;: {&#xA;      &#34;id&#34;: &#34;bX7iB3AnaRh9Z+itWa3Xyw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-31789&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Converting an excessively large OCTET STRING value to a hexadecimal string leads to a heap buffer overflow on 32 bit platforms.  Impact summary: A heap buffer overflow may lead to a crash or possibly an attacker controlled code execution or other undefined behavior.  If an attacker can supply a crafted X.509 certificate with an excessively large OCTET STRING value in extensions such as the Subject Key Identifier (SKID) or Authority Key Identifier (AKID) which are being converted to hex, the size of the buffer needed for the result is calculated as multiplication of the input length by 3. On 32 bit platforms, this multiplication may overflow resulting in the allocation of a smaller buffer and a heap buffer overflow.  Applications and services that print or log contents of untrusted X.509 certificates are vulnerable to this issue. As the certificates would have to have sizes of over 1 Gigabyte, printing or logging such certificates is a fairly unlikely operation and only 32 bit platforms are affected, this issue was assigned Low severity.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-31789&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bZ2m6J3EIvmTdjYJprlOKA==&#34;: {&#xA;      &#34;id&#34;: &#34;bZ2m6J3EIvmTdjYJprlOKA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36085&#34;,&#xA;      &#34;description&#34;: &#34;The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36085&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;bjAyJcmSN59FnAeiA6RMIg==&#34;: {&#xA;      &#34;id&#34;: &#34;bjAyJcmSN59FnAeiA6RMIg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28389&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: During processing of a crafted CMS EnvelopedData message with KeyAgreeRecipientInfo a NULL pointer dereference can happen.  Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resulting in Denial of Service.  When a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is processed, the optional parameters field of KeyEncryptionAlgorithmIdentifier is examined without checking for its presence. This results in a NULL pointer dereference if the field is missing.  Applications and services that call CMS_decrypt() on untrusted input (e.g., S/MIME processing or CMS-based protocols) are vulnerable.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-28389&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;brAAPyN4siIQT5bxa9xu4g==&#34;: {&#xA;      &#34;id&#34;: &#34;brAAPyN4siIQT5bxa9xu4g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-47038&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;5.32.1-4+deb11u3&#34;&#xA;    },&#xA;    &#34;c9VxNhSZmjnQmY3rI/q1PA==&#34;: {&#xA;      &#34;id&#34;: &#34;c9VxNhSZmjnQmY3rI/q1PA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15281&#34;,&#xA;      &#34;description&#34;: &#34;Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-15281&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;: {&#xA;      &#34;id&#34;: &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-5709&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \&#34;dbentry-\u003en_key_data\&#34; in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \&#34;u4\&#34; variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2018-5709&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cZD87tDO2q60EFy3BAZ33g==&#34;: {&#xA;      &#34;id&#34;: &#34;cZD87tDO2q60EFy3BAZ33g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0464&#34;,&#xA;      &#34;description&#34;: &#34;A security vulnerability has been identified in all supported versions  of OpenSSL related to the verification of X.509 certificate chains that include policy constraints.  Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.  Policy processing is disabled by default but can be enabled by passing the `-policy&#39; argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0464&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u5&#34;&#xA;    },&#xA;    &#34;ce9B0jxjyNiCfG4VtZhnVw==&#34;: {&#xA;      &#34;id&#34;: &#34;ce9B0jxjyNiCfG4VtZhnVw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2011-4116&#34;,&#xA;      &#34;description&#34;: &#34;_is_safe in the File::Temp module for Perl does not properly handle symlinks.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2011-4116&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;: {&#xA;      &#34;id&#34;: &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29491&#34;,&#xA;      &#34;description&#34;: &#34;ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-29491&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;6.2+20201114-2+deb11u2&#34;&#xA;    },&#xA;    &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-36054&#34;,&#xA;      &#34;description&#34;: &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-36054&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u4&#34;&#xA;    },&#xA;    &#34;dUTZP+bcDNUqytJV02E1dQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dUTZP+bcDNUqytJV02E1dQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6965&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dZ/H1sYv9QSX9VO93tlGLw==&#34;: {&#xA;      &#34;id&#34;: &#34;dZ/H1sYv9QSX9VO93tlGLw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-4xh5-x5gv-qwph&#34;,&#xA;      &#34;description&#34;: &#34;pip&#39;s fallback tar extraction doesn&#39;t check symbolic links point to extraction directory&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-24T15:31:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2025-8869 https://github.com/pypa/pip/pull/13550 https://github.com/pypa/pip/commit/f2b92314da012b9fffa36b3f3e67748a37ef464a https://github.com/pypa/pip https://lists.debian.org/debian-lts-announce/2025/10/msg00028.html https://mail.python.org/archives/list/security-announce@python.org/thread/IF5A3GCJY3VH7BVHJKOWOJFKTW7VFQEN https://pip.pypa.io/en/stable/news/#v25-2&#34;,&#xA;      &#34;severity&#34;: &#34;MODERATE&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=25.3&#34;&#xA;    },&#xA;    &#34;eietxU2AL+GdeSQwh6n6XA==&#34;: {&#xA;      &#34;id&#34;: &#34;eietxU2AL+GdeSQwh6n6XA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0215&#34;,&#xA;      &#34;description&#34;: &#34;The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications.  The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash.    This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7.  Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream.  The OpenSSL cms and smime command line applications are similarly affected.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0215&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;epkSU4TSX3BVrueh1mbRzg==&#34;: {&#xA;      &#34;id&#34;: &#34;epkSU4TSX3BVrueh1mbRzg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-13176&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: A timing side-channel which could potentially allow recovering the private key exists in the ECDSA signature computation.  Impact summary: A timing side-channel in ECDSA signature computations could allow recovering the private key by an attacker. However, measuring the timing would require either local access to the signing application or a very fast network connection with low latency.  There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This can happen with significant probability only for some of the supported elliptic curves. In particular the NIST P-521 curve is affected. To be able to measure this leak, the attacker process must either be located in the same physical computer or must have a very fast network connection with low latency. For that reason the severity of this vulnerability is Low.  The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-13176&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u3&#34;&#xA;    },&#xA;    &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;: {&#xA;      &#34;id&#34;: &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6020&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6020&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.4.0-9+deb11u2&#34;&#xA;    },&#xA;    &#34;fUdim7gaWpwZtynNz5GiKg==&#34;: {&#xA;      &#34;id&#34;: &#34;fUdim7gaWpwZtynNz5GiKg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0361&#34;,&#xA;      &#34;description&#34;: &#34;A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0361&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u3&#34;&#xA;    },&#xA;    &#34;fXJD4KsFmfzjgWJPYHqTrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;fXJD4KsFmfzjgWJPYHqTrQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-8457&#34;,&#xA;      &#34;description&#34;: &#34;SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-8457&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;db5.3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fharKhY7OXyx+gXJAwiegw==&#34;: {&#xA;      &#34;id&#34;: &#34;fharKhY7OXyx+gXJAwiegw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-29088&#34;,&#xA;      &#34;description&#34;: &#34;In SQLite 3.49.0 before 3.49.1, certain argument values to sqlite3_db_config (in the C-language API) can cause a denial of service (application crash). An sz*nBig multiplication is not cast to a 64-bit integer, and consequently some memory allocations may be incorrect.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-29088&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;: {&#xA;      &#34;id&#34;: &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3184&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-3184&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;g44foSnimIkShQZtpEhjbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;g44foSnimIkShQZtpEhjbQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2011-3389&#34;,&#xA;      &#34;description&#34;: &#34;The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \&#34;BEAST\&#34; attack.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2011-3389&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;g9KEtrzigl5TCrpvLCQU5A==&#34;: {&#xA;      &#34;id&#34;: &#34;g9KEtrzigl5TCrpvLCQU5A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer.  Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service.  The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8_putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, causing write outside of heap allocated buffer.  The vulnerability is reachable via the public PKCS12_get_friendlyname() API when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a different code path that avoids this issue, PKCS12_get_friendlyname() directly invokes the vulnerable function. Exploitation requires an attacker to provide a malicious PKCS#12 file to be parsed by the application and the attacker can just trigger a one zero byte write before the allocated buffer. For that reason the issue was assessed as Low severity according to our Security Policy.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.  OpenSSL 1.0.2 is not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69419&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;gMRlXKqXSfP5n8UiPW430Q==&#34;: {&#xA;      &#34;id&#34;: &#34;gMRlXKqXSfP5n8UiPW430Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings  The Name Service Cache Daemon&#39;s (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 when the cache was added to nscd.  This vulnerability is only present in the nscd binary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-33602&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u10&#34;&#xA;    },&#xA;    &#34;h35IL7k4erNtmTSolINnjA==&#34;: {&#xA;      &#34;id&#34;: &#34;h35IL7k4erNtmTSolINnjA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;ECHO-7db2-03aa-5591&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-03T08:35:22Z&#34;,&#xA;      &#34;links&#34;: &#34;https://advisory.echohq.com/cve/CVE-2026-1703&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=25.2%2Becho.1&#34;&#xA;    },&#xA;    &#34;h7Lhy275V3QLvnBLGAulbw==&#34;: {&#xA;      &#34;id&#34;: &#34;h7Lhy275V3QLvnBLGAulbw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;PYSEC-2023-62&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-02T18:15:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pallets/flask/commit/70f906c51ce49c485f1d355703e9cc3386b1cc2b https://github.com/pallets/flask/releases/tag/2.3.2 https://github.com/pallets/flask/releases/tag/2.2.5 https://github.com/pallets/flask/security/advisories/GHSA-m2qf-hxjv-5gpq https://github.com/pallets/flask/commit/afd63b16170b7c047f5758eb910c416511e9c965&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;flask&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=2.2.5&#34;&#xA;    },&#xA;    &#34;hb+m0qlWxENYdrb1R811qA==&#34;: {&#xA;      &#34;id&#34;: &#34;hb+m0qlWxENYdrb1R811qA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32776&#34;,&#xA;      &#34;description&#34;: &#34;libexpat before 2.7.5 allows a NULL pointer dereference with empty external parameter entity content.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-32776&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jJNc2KwFwVg03DlaNN1nbA==&#34;: {&#xA;      &#34;id&#34;: &#34;jJNc2KwFwVg03DlaNN1nbA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4806&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jS/WQ+ua63nFUvjSzoQw1g==&#34;: {&#xA;      &#34;id&#34;: &#34;jS/WQ+ua63nFUvjSzoQw1g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2236&#34;,&#xA;      &#34;description&#34;: &#34;A timing-based side-channel flaw was found in libgcrypt&#39;s RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-2236&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;k6VTDL+fxGnbqAk/IPGlnQ==&#34;: {&#xA;      &#34;id&#34;: &#34;k6VTDL+fxGnbqAk/IPGlnQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29383&#34;,&#xA;      &#34;description&#34;: &#34;In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \\n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \\r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that \&#34;cat /etc/passwd\&#34; shows a rogue user account.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-29383&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:4.8.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;k6fjQGJuJ+9NXMFLa5+CgA==&#34;: {&#xA;      &#34;id&#34;: &#34;k6fjQGJuJ+9NXMFLa5+CgA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2016-2781&#34;,&#xA;      &#34;description&#34;: &#34;chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal&#39;s input buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2016-2781&#34;,&#xA;      &#34;severity&#34;: &#34;low&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;k82HOcJqNkts86KJ0glvow==&#34;: {&#xA;      &#34;id&#34;: &#34;k82HOcJqNkts86KJ0glvow==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31484&#34;,&#xA;      &#34;description&#34;: &#34;CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31484&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;5.32.1-4+deb11u4&#34;&#xA;    },&#xA;    &#34;kgqUyyy6Fd5CUNREC3t1jg==&#34;: {&#xA;      &#34;id&#34;: &#34;kgqUyyy6Fd5CUNREC3t1jg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32988&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure.  This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-32988&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u8&#34;&#xA;    },&#xA;    &#34;khiBNMMi17UID6UagXI8LA==&#34;: {&#xA;      &#34;id&#34;: &#34;khiBNMMi17UID6UagXI8LA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36086&#34;,&#xA;      &#34;description&#34;: &#34;The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36086&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;kwKUYCnvi/GndNgicLw/RQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kwKUYCnvi/GndNgicLw/RQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0466&#34;,&#xA;      &#34;description&#34;: &#34;The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification.  As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function.  Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument.  Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0466&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u5&#34;&#xA;    },&#xA;    &#34;kwonOUycdcBenNhjZ1b//Q==&#34;: {&#xA;      &#34;id&#34;: &#34;kwonOUycdcBenNhjZ1b//Q==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-68rp-wp8r-4726&#34;,&#xA;      &#34;description&#34;: &#34;Flask session does not add `Vary: Cookie` header when accessed in some ways&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-19T20:45:41Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pallets/flask/security/advisories/GHSA-68rp-wp8r-4726 https://nvd.nist.gov/vuln/detail/CVE-2026-27205 https://github.com/pallets/flask/commit/089cb86dd22bff589a4eafb7ab8e42dc357623b4 https://github.com/pallets/flask https://github.com/pallets/flask/releases/tag/3.1.3&#34;,&#xA;      &#34;severity&#34;: &#34;LOW&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;flask&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=3.1.3&#34;&#xA;    },&#xA;    &#34;l6iyFrb04z9eZxh35gAtVA==&#34;: {&#xA;      &#34;id&#34;: &#34;l6iyFrb04z9eZxh35gAtVA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-0395&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u12&#34;&#xA;    },&#xA;    &#34;l8HSGkC4gSxCEUDns7KKfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;l8HSGkC4gSxCEUDns7KKfQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2011-3374&#34;,&#xA;      &#34;description&#34;: &#34;It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2011-3374&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;apt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lAYsMZ/1tV9arAE2k+zsAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lAYsMZ/1tV9arAE2k+zsAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31437&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent \&#34;a reply denying that any of the finding was a security vulnerability.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31437&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lShmgiPGgmUIO0VwzhSBRA==&#34;: {&#xA;      &#34;id&#34;: &#34;lShmgiPGgmUIO0VwzhSBRA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2650&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow.  Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service.  An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit.  OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods.  When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time.  The time complexity is O(n^2) with &#39;n&#39; being the size of the sub-identifiers in bytes (*).  With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced.  This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms.  Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data.  Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL.  If the use is for the mere purpose of display, the severity is considered low.  In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS.  It also impacts anything that processes X.509 certificates, including simple things like verifying its signature.  The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer&#39;s certificate chain.  Additionally, this only impacts clients, or servers that have explicitly enabled client authentication.  In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates.  This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-2650&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u5&#34;&#xA;    },&#xA;    &#34;lnMcIzRPoETIbrbgdDGINA==&#34;: {&#xA;      &#34;id&#34;: &#34;lnMcIzRPoETIbrbgdDGINA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-46848&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-46848&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;4.16.0-2+deb11u1&#34;&#xA;    },&#xA;    &#34;m619DfZfUke+jaTAnoZ2Xw==&#34;: {&#xA;      &#34;id&#34;: &#34;m619DfZfUke+jaTAnoZ2Xw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7008&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-7008&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u6&#34;&#xA;    },&#xA;    &#34;m8d/cgBRVljmHKGy6mUUXw==&#34;: {&#xA;      &#34;id&#34;: &#34;m8d/cgBRVljmHKGy6mUUXw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;Perl threads have a working directory race condition where file operations may target unintended paths.  If a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running.   This may lead to unintended operations such as loading code or accessing files from unexpected locations, which a local attacker may be able to exploit.  The bug was introduced in commit 11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-40909&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;5.32.1-4+deb11u5&#34;&#xA;    },&#xA;    &#34;mJA9Uto8Hh0tElNp2qoYaA==&#34;: {&#xA;      &#34;id&#34;: &#34;mJA9Uto8Hh0tElNp2qoYaA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-7245&#34;,&#xA;      &#34;description&#34;: &#34;Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-7245&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;meQYB1JR+XE3En/RrDfPvA==&#34;: {&#xA;      &#34;id&#34;: &#34;meQYB1JR+XE3En/RrDfPvA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4415&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-4415&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u2&#34;&#xA;    },&#xA;    &#34;mj6UKCnVoHnC6YBWJGf/Ug==&#34;: {&#xA;      &#34;id&#34;: &#34;mj6UKCnVoHnC6YBWJGf/Ug==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-mq26-g339-26xf&#34;,&#xA;      &#34;description&#34;: &#34;Command Injection in pip when used with Mercurial&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-25T18:32:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2023-5752 https://github.com/pypa/pip/pull/12306 https://github.com/pypa/pip/commit/389cb799d0da9a840749fcd14878928467ed49b4 https://github.com/pypa/advisory-database/tree/main/vulns/pip/PYSEC-2023-228.yaml https://github.com/pypa/pip https://lists.debian.org/debian-lts-announce/2025/10/msg00028.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/622OZXWG72ISQPLM5Y57YCVIMWHD4C3U https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65UKKF5LBHEFDCUSPBHUN4IHYX7SRMHH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXUVMJM25PUAZRQZBF54OFVKTY3MINPW https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFC2SPFG5FLCZBYY2K3T5MFW2D22NG6E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YBSB3SUPQ3VIFYUMHPO3MEQI4BJAXKCZ https://mail.python.org/archives/list/security-announce@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=23.3&#34;&#xA;    },&#xA;    &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;: {&#xA;      &#34;id&#34;: &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-0563&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \&#34;INPUTRC\&#34; environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-0563&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;n+1p0npJfBZ4vUpG1OFi6w==&#34;: {&#xA;      &#34;id&#34;: &#34;n+1p0npJfBZ4vUpG1OFi6w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-50868&#34;,&#xA;      &#34;description&#34;: &#34;The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the \&#34;NSEC3\&#34; issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-50868&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u6&#34;&#xA;    },&#xA;    &#34;nApP7wP3SU/Fk79xF589WA==&#34;: {&#xA;      &#34;id&#34;: &#34;nApP7wP3SU/Fk79xF589WA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40226&#34;,&#xA;      &#34;description&#34;: &#34;In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-40226&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u8&#34;&#xA;    },&#xA;    &#34;o75dmeL6883s7llfbkU+PA==&#34;: {&#xA;      &#34;id&#34;: &#34;o75dmeL6883s7llfbkU+PA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45490&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-45490&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u6&#34;&#xA;    },&#xA;    &#34;oeIf5WAd0bERBmJCeLsqIg==&#34;: {&#xA;      &#34;id&#34;: &#34;oeIf5WAd0bERBmJCeLsqIg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-7246&#34;,&#xA;      &#34;description&#34;: &#34;Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-7246&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pa+2016jZIT5xycgFHsAsQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pa+2016jZIT5xycgFHsAsQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-20796&#34;,&#xA;      &#34;description&#34;: &#34;In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by &#39;(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+&#39; in grep.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2018-20796&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pmcR65l6CQ+6Qdh99gUtFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pmcR65l6CQ+6Qdh99gUtFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-52425&#34;,&#xA;      &#34;description&#34;: &#34;libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-52425&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u6&#34;&#xA;    },&#xA;    &#34;pu8XvxoOXeKAI0tvpRRucg==&#34;: {&#xA;      &#34;id&#34;: &#34;pu8XvxoOXeKAI0tvpRRucg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5678&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow.  Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays.  Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.  While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn&#39;t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters.  Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn&#39;t check for an excessively large Q.  An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack.  DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions.  An application calling any of those other functions may similarly be affected.  The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate().  Also vulnerable are the OpenSSL pkey command line application when using the \&#34;-pubcheck\&#34; option, as well as the OpenSSL genpkey command line application.  The OpenSSL SSL/TLS implementation is not affected by this issue.  The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-5678&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;qDLWFSo6NpfxWPhSeAS8zQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qDLWFSo6NpfxWPhSeAS8zQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28834&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-28834&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u6&#34;&#xA;    },&#xA;    &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;: {&#xA;      &#34;id&#34;: &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-14104&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qhu8cH6U47vSCL4GXDHHtA==&#34;: {&#xA;      &#34;id&#34;: &#34;qhu8cH6U47vSCL4GXDHHtA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4641&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4641&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:4.8.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;: {&#xA;      &#34;id&#34;: &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69720&#34;,&#xA;      &#34;description&#34;: &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69720&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;s55QOTlka9E4jTdGv0d/FA==&#34;: {&#xA;      &#34;id&#34;: &#34;s55QOTlka9E4jTdGv0d/FA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-4802&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u13&#34;&#xA;    },&#xA;    &#34;srcIw8ffB6famHHqmqImEw==&#34;: {&#xA;      &#34;id&#34;: &#34;srcIw8ffB6famHHqmqImEw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3817&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Checking excessively long DH keys or parameters may be very slow.  Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.  The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p.  An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack.  The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check().  Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \&#34;-check\&#34; option.  The OpenSSL SSL/TLS implementation is not affected by this issue.  The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-3817&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1v-0~deb11u1&#34;&#xA;    },&#xA;    &#34;svo9ZP0wOZ7IXZp//n2f7g==&#34;: {&#xA;      &#34;id&#34;: &#34;svo9ZP0wOZ7IXZp//n2f7g==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-m2qf-hxjv-5gpq&#34;,&#xA;      &#34;description&#34;: &#34;Flask vulnerable to possible disclosure of permanent session cookie due to missing Vary: Cookie header&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-01T19:22:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pallets/flask/security/advisories/GHSA-m2qf-hxjv-5gpq https://nvd.nist.gov/vuln/detail/CVE-2023-30861 https://github.com/pallets/flask/commit/70f906c51ce49c485f1d355703e9cc3386b1cc2b https://github.com/pallets/flask/commit/afd63b16170b7c047f5758eb910c416511e9c965 https://github.com/pallets/flask https://github.com/pallets/flask/releases/tag/2.2.5 https://github.com/pallets/flask/releases/tag/2.3.2 https://github.com/pypa/advisory-database/tree/main/vulns/flask/PYSEC-2023-62.yaml https://lists.debian.org/debian-lts-announce/2023/08/msg00024.html https://security.netapp.com/advisory/ntap-20230818-0006 https://www.debian.org/security/2023/dsa-5442&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;flask&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=2.2.5&#34;&#xA;    },&#xA;    &#34;swQXHeTg1VEUQHser/6eEQ==&#34;: {&#xA;      &#34;id&#34;: &#34;swQXHeTg1VEUQHser/6eEQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-50387&#34;,&#xA;      &#34;description&#34;: &#34;Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the \&#34;KeyTrap\&#34; issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-50387&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u6&#34;&#xA;    },&#xA;    &#34;t3CEDp5fZQ6D+aOizMiuSg==&#34;: {&#xA;      &#34;id&#34;: &#34;t3CEDp5fZQ6D+aOizMiuSg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0286&#34;,&#xA;      &#34;description&#34;: &#34;There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING.  When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0286&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;tBbOIOCaKVlwik7hH/baMQ==&#34;: {&#xA;      &#34;id&#34;: &#34;tBbOIOCaKVlwik7hH/baMQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-45346&#34;,&#xA;      &#34;description&#34;: &#34;A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-45346&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tjx9raP+v/Zzj6SBJct3WA==&#34;: {&#xA;      &#34;id&#34;: &#34;tjx9raP+v/Zzj6SBJct3WA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7104&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-7104&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.34.1-3+deb11u1&#34;&#xA;    },&#xA;    &#34;tne7uZ2E+Ev6QI7ctt3PxA==&#34;: {&#xA;      &#34;id&#34;: &#34;tne7uZ2E+Ev6QI7ctt3PxA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;nscd: Null pointer crashes after notfound response  If the Name Service Cache Daemon&#39;s (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference.  This flaw was introduced in glibc 2.15 when the cache was added to nscd.  This vulnerability is only present in the nscd binary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-33600&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u10&#34;&#xA;    },&#xA;    &#34;u+ya+p/mAtLPAYAgbSPTTw==&#34;: {&#xA;      &#34;id&#34;: &#34;u+ya+p/mAtLPAYAgbSPTTw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41409&#34;,&#xA;      &#34;description&#34;: &#34;Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-41409&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u4BvRhFacDxQuC7pVeExQg==&#34;: {&#xA;      &#34;id&#34;: &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27456&#34;,&#xA;      &#34;description&#34;: &#34;util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-27456&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uEg5UAxE9NNjF71OxdO7uQ==&#34;: {&#xA;      &#34;id&#34;: &#34;uEg5UAxE9NNjF71OxdO7uQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-16231&#34;,&#xA;      &#34;description&#34;: &#34;In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive call. NOTE: third parties dispute the relevance of this report, noting that there are options that can be used to limit the amount of stack that is used&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-16231&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uTSYWROavw8Bf2n+4djlMg==&#34;: {&#xA;      &#34;id&#34;: &#34;uTSYWROavw8Bf2n+4djlMg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.  A SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-4598&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u7&#34;&#xA;    },&#xA;    &#34;ugZgSJOxFzPCX6LQaJzM3A==&#34;: {&#xA;      &#34;id&#34;: &#34;ugZgSJOxFzPCX6LQaJzM3A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-5535&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer.  Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application.  The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists).  This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a \&#34;no overlap\&#34; response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem.  In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur.  This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely.  The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.  Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-5535&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;uspznaGFEzt4cX0xZ36sYw==&#34;: {&#xA;      &#34;id&#34;: &#34;uspznaGFEzt4cX0xZ36sYw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28390&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: During processing of a crafted CMS EnvelopedData message with KeyTransportRecipientInfo a NULL pointer dereference can happen.  Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resulting in Denial of Service.  When a CMS EnvelopedData message that uses KeyTransportRecipientInfo with RSA-OAEP encryption is processed, the optional parameters field of RSA-OAEP SourceFunc algorithm identifier is examined without checking for its presence. This results in a NULL pointer dereference if the field is missing.  Applications and services that call CMS_decrypt() on untrusted input (e.g., S/MIME processing or CMS-based protocols) are vulnerable.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-28390&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uwoSIcSlln9YRd7N1Kc3KQ==&#34;: {&#xA;      &#34;id&#34;: &#34;uwoSIcSlln9YRd7N1Kc3KQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40228&#34;,&#xA;      &#34;description&#34;: &#34;In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a \&#34;logger -p emerg\&#34; command is executed, if ForwardToWall=yes is set.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-40228&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vcYYj1nbYwczzoLG255iZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vcYYj1nbYwczzoLG255iZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4039&#34;,&#xA;      &#34;description&#34;: &#34;**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains  that target AArch64 allows an attacker to exploit an existing buffer  overflow in dynamically-sized local variables in your application  without this being detected. This stack-protector failure only applies  to C99-style dynamically-sized local variables or those created using  alloca(). The stack-protector operates as intended for statically-sized  local variables.  The default behavior when the stack-protector  detects an overflow is to terminate your application, resulting in  controlled loss of availability. An attacker who can exploit a buffer  overflow without triggering the stack-protector might be able to change  program flow control to cause an uncontrolled loss of availability or to  go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4039&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vmet9boOEsf+RUsh5rJnEw==&#34;: {&#xA;      &#34;id&#34;: &#34;vmet9boOEsf+RUsh5rJnEw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4741&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations  Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications.  The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use.  The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arrived. In this case calling SSL_free_buffers will succeed even though a record has only been partially processed and the buffer is still in use.  The second scenario occurs where a full record containing application data has been received and processed by OpenSSL but the application has only read part of this data. Again a call to SSL_free_buffers will succeed even though the buffer is still in use.  While these scenarios could occur accidentally during normal operation a malicious attacker could attempt to engineer a stituation where this occurs. We are not aware of this issue being actively exploited.  The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-4741&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;w4Wr213OT8TRxlHAy3MwPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;w4Wr213OT8TRxlHAy3MwPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2010-4756&#34;,&#xA;      &#34;description&#34;: &#34;The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2010-4756&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wFMwqYmfC1KjDKz8vyBr4A==&#34;: {&#xA;      &#34;id&#34;: &#34;wFMwqYmfC1KjDKz8vyBr4A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4911&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u7&#34;&#xA;    },&#xA;    &#34;wzv81XuYHOFtlrLHaamjZg==&#34;: {&#xA;      &#34;id&#34;: &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-37371&#34;,&#xA;      &#34;description&#34;: &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-37371&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u5&#34;&#xA;    },&#xA;    &#34;x3SWTcEL2lgEvouAhmt6fQ==&#34;: {&#xA;      &#34;id&#34;: &#34;x3SWTcEL2lgEvouAhmt6fQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27587&#34;,&#xA;      &#34;description&#34;: &#34;OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable to a Minerva attack, exploitable by measuring the time of signing of random messages using the EVP_DigestSign API, and then using the private key to extract the K value (nonce) from the signatures. Next, based on the bit size of the extracted nonce, one can compare the signing time of full-sized nonces to signatures that used smaller nonces, via statistical tests. There is a side-channel in the P-364 curve that allows private key extraction (also, there is a dependency between the bit size of K and the size of the side channel). NOTE: This CVE is disputed because the OpenSSL security policy explicitly notes that any side channels which require same physical system to be detected are outside of the threat model for the software. The timing signal is so small that it is infeasible to be detected without having the attacking process running on the same physical system.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-27587&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xZI5XEFq7Cuk3Mu3KyTdmg==&#34;: {&#xA;      &#34;id&#34;: &#34;xZI5XEFq7Cuk3Mu3KyTdmg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-56433&#34;,&#xA;      &#34;description&#34;: &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-56433&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;y2mOh8WlJTCvA6wlULAyvA==&#34;: {&#xA;      &#34;id&#34;: &#34;y2mOh8WlJTCvA6wlULAyvA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68973&#34;,&#xA;      &#34;description&#34;: &#34;In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-68973&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.27-2+deb11u3&#34;&#xA;    },&#xA;    &#34;ySGl3ADUS8EeTeweiO86Aw==&#34;: {&#xA;      &#34;id&#34;: &#34;ySGl3ADUS8EeTeweiO86Aw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-9143&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes.  Impact summary: Out of bound memory writes can lead to an application crash or even a possibility of a remote code execution, however, in all the protocols involving Elliptic Curve Cryptography that we&#39;re aware of, either only \&#34;named curves\&#34; are supported, or, if explicit curve parameters are supported, they specify an X9.62 encoding of binary (GF(2^m)) curves that can&#39;t represent problematic input values. Thus the likelihood of existence of a vulnerable application is low.  In particular, the X9.62 encoding is used for ECC keys in X.509 certificates, so problematic inputs cannot occur in the context of processing X.509 certificates.  Any problematic use-cases would have to be using an \&#34;exotic\&#34; curve encoding.  The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions.  Applications working with \&#34;exotic\&#34; explicit binary (GF(2^m)) curve parameters, that make it possible to represent invalid field polynomials with a zero constant term, via the above or similar APIs, may terminate abruptly as a result of reading or writing outside of array bounds.  Remote code execution cannot easily be ruled out.  The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-9143&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;yyExMMKc3SPW2jNE01wTug==&#34;: {&#xA;      &#34;id&#34;: &#34;yyExMMKc3SPW2jNE01wTug==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file.  Impact summary: An application processing a malformed PKCS#12 file can be caused to dereference an invalid or NULL pointer on memory read, resulting in a Denial of Service.  A type confusion vulnerability exists in PKCS#12 parsing code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid pointer read.  The location is constrained to a 1-byte address space, meaning any attempted pointer manipulation can only target addresses between 0x00 and 0xFF. This range corresponds to the zero page, which is unmapped on most modern operating systems and will reliably result in a crash, leading only to a Denial of Service. Exploiting this issue also requires a user or application to process a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted PKCS#12 files in applications as they are usually used to store private keys which are trusted by definition. For these reasons, the issue was assessed as Low severity.  The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS12 implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.  OpenSSL 1.0.2 is not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-22795&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;yyhzQNC9UPFT5NwvhGsvqg==&#34;: {&#xA;      &#34;id&#34;: &#34;yyhzQNC9UPFT5NwvhGsvqg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2097&#34;,&#xA;      &#34;description&#34;: &#34;AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn&#39;t written. In the special case of \&#34;in place\&#34; encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-2097&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-29458&#34;,&#xA;      &#34;description&#34;: &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-29458&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;6.2+20201114-2+deb11u1&#34;&#xA;    },&#xA;    &#34;ziMZexwNoFxp4mgVOJVBNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ziMZexwNoFxp4mgVOJVBNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function.  Impact summary: A NULL pointer dereference can trigger a crash which leads to Denial of Service for an application processing PKCS#12 files.  The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct parameter is NULL before dereferencing it. When called from PKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can be NULL, causing a crash. The vulnerability is limited to Denial of Service and cannot be escalated to achieve code execution or memory disclosure.  Exploiting this issue requires an attacker to provide a malformed PKCS#12 file to an application that processes it. For that reason the issue was assessed as Low severity according to our Security Policy.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69421&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    }&#xA;  },&#xA;  &#34;package_vulnerabilities&#34;: {&#xA;    &#34;+ol9cHiNc+RWiD7Kw3TLCg==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;0jMyX7UCIuSpntMN1r7Ofg==&#34;: [&#xA;      &#34;KwgIGMm765S+zvIBAwM9+g==&#34;&#xA;    ],&#xA;    &#34;2MObxiEVNllmUEzdVZM5qw==&#34;: [&#xA;      &#34;l8HSGkC4gSxCEUDns7KKfQ==&#34;&#xA;    ],&#xA;    &#34;3f992oeEQfSQxRA0nlq8Wg==&#34;: [&#xA;      &#34;DfxJWBpJUY1aHu0ZUSilDg==&#34;,&#xA;      &#34;U3JbUhrT2SqWNuYU5d13cQ==&#34;,&#xA;      &#34;jS/WQ+ua63nFUvjSzoQw1g==&#34;&#xA;    ],&#xA;    &#34;4jCPzhS6OWt4agz9d/cfTw==&#34;: [&#xA;      &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;,&#xA;      &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;&#xA;    ],&#xA;    &#34;7a3yla6TRFZrhmAreU7f8Q==&#34;: [&#xA;      &#34;IvA5abshk33BAuuBar/pVQ==&#34;,&#xA;      &#34;BtqRPc7F47wJWygPNOxw1w==&#34;,&#xA;      &#34;6jg3v7lJ92IZCQpZydR2sA==&#34;,&#xA;      &#34;o75dmeL6883s7llfbkU+PA==&#34;,&#xA;      &#34;IJPGr43VMeLym6tW3EWgdg==&#34;,&#xA;      &#34;DS2nhayHHtinLlFzZheSwg==&#34;,&#xA;      &#34;5Cmp5KJXv+nVwwcs5/Kz7w==&#34;,&#xA;      &#34;hb+m0qlWxENYdrb1R811qA==&#34;,&#xA;      &#34;9ThuL3zLKpmduvKpiDZ60w==&#34;,&#xA;      &#34;UdV1OleGh/0MAkug0ZAlcQ==&#34;,&#xA;      &#34;pmcR65l6CQ+6Qdh99gUtFQ==&#34;,&#xA;      &#34;/7UJLAHsMPxTtTxvuPgrzA==&#34;,&#xA;      &#34;DkvPjH9ZM3anH55rsU+i3w==&#34;,&#xA;      &#34;Ud6njM/DPIrfSPiFct82Lw==&#34;,&#xA;      &#34;5+uzHCKkmvMK8jl2uJkFqQ==&#34;,&#xA;      &#34;KZ3Jt7zkiM272dGLstI4XA==&#34;,&#xA;      &#34;MdrEi+/OrLlW3zDrheID2Q==&#34;&#xA;    ],&#xA;    &#34;8alfBYUr5uWbAyB5PrY8Hg==&#34;: [&#xA;      &#34;uTSYWROavw8Bf2n+4djlMg==&#34;,&#xA;      &#34;5rGwN3bKZLMvxcM/W4jj+A==&#34;,&#xA;      &#34;ASrdm9EROwWp9Ip2w7HH5w==&#34;,&#xA;      &#34;lAYsMZ/1tV9arAE2k+zsAQ==&#34;,&#xA;      &#34;uwoSIcSlln9YRd7N1Kc3KQ==&#34;,&#xA;      &#34;m619DfZfUke+jaTAnoZ2Xw==&#34;,&#xA;      &#34;WG/hQnqUufOh6/5/mlRi/Q==&#34;,&#xA;      &#34;swQXHeTg1VEUQHser/6eEQ==&#34;,&#xA;      &#34;nApP7wP3SU/Fk79xF589WA==&#34;,&#xA;      &#34;U5598afGvRaltva6Rjqnug==&#34;,&#xA;      &#34;n+1p0npJfBZ4vUpG1OFi6w==&#34;,&#xA;      &#34;1dwwvWkARnFe67yAAGVglQ==&#34;,&#xA;      &#34;0q/btA3zBEGWWmFxU7cNig==&#34;,&#xA;      &#34;meQYB1JR+XE3En/RrDfPvA==&#34;,&#xA;      &#34;GRlufCZFwHNK64OQNCFIcg==&#34;,&#xA;      &#34;+x9OyXfXk9PrekfsnPKwlg==&#34;&#xA;    ],&#xA;    &#34;Akbft1KN+9FKNhh1tM25eA==&#34;: [&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;&#xA;    ],&#xA;    &#34;BJL42acLPAR8bEnmM1Z3mg==&#34;: [&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;&#xA;    ],&#xA;    &#34;CBzoMmlXBcyP54HOnauO0g==&#34;: [&#xA;      &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;,&#xA;      &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;&#xA;    ],&#xA;    &#34;D0G6c/ML9XX4eoGHgx1jeQ==&#34;: [&#xA;      &#34;9JIazCQjSvYhpG9KE6d7Pg==&#34;,&#xA;      &#34;ZxTVeoHgmvhWXsV+xLzphA==&#34;,&#xA;      &#34;WHvU12ysgz1Ai1y1KSOiLA==&#34;,&#xA;      &#34;DJOf0vCfrT4GvRr/tBJhbg==&#34;,&#xA;      &#34;Y4A2Zm5xcsipvfluZVH5fA==&#34;,&#xA;      &#34;GezxxUl3QPWUTitg/VHmlQ==&#34;,&#xA;      &#34;jJNc2KwFwVg03DlaNN1nbA==&#34;,&#xA;      &#34;w4Wr213OT8TRxlHAy3MwPQ==&#34;,&#xA;      &#34;tne7uZ2E+Ev6QI7ctt3PxA==&#34;,&#xA;      &#34;pa+2016jZIT5xycgFHsAsQ==&#34;,&#xA;      &#34;l6iyFrb04z9eZxh35gAtVA==&#34;,&#xA;      &#34;gMRlXKqXSfP5n8UiPW430Q==&#34;,&#xA;      &#34;ZdGgPSEZdeQ3XJo0+ZpAXQ==&#34;,&#xA;      &#34;IwuADin5bagOGQErETBgWw==&#34;,&#xA;      &#34;CfS0L/tTata7W0FXXtQ4EQ==&#34;,&#xA;      &#34;MYYkxlB4Ank1zsdIh41apg==&#34;,&#xA;      &#34;c9VxNhSZmjnQmY3rI/q1PA==&#34;,&#xA;      &#34;s55QOTlka9E4jTdGv0d/FA==&#34;,&#xA;      &#34;OTqcMsspao5I6JZMETZ06w==&#34;,&#xA;      &#34;ELw1b1vO2YOtV7qNQijgCw==&#34;,&#xA;      &#34;aqMHDRnPT+3QNU/8tSwsog==&#34;,&#xA;      &#34;T2SiDOPpMK0bU0Y0qkOm1A==&#34;,&#xA;      &#34;wFMwqYmfC1KjDKz8vyBr4A==&#34;,&#xA;      &#34;/YwO4YLRGgF2uWU55V6+MQ==&#34;&#xA;    ],&#xA;    &#34;DtMxcnDA8Je9vAHjmzagaA==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;ExYxXcgoIRjAjUObwDE4jA==&#34;: [&#xA;      &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;,&#xA;      &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;&#xA;    ],&#xA;    &#34;FJIijlwFNqvdoVBcfTF/pg==&#34;: [&#xA;      &#34;WCGqond4znYKCRcm4xyPrg==&#34;,&#xA;      &#34;CtYegggqGbMfg16G/qfITQ==&#34;,&#xA;      &#34;qhu8cH6U47vSCL4GXDHHtA==&#34;,&#xA;      &#34;xZI5XEFq7Cuk3Mu3KyTdmg==&#34;,&#xA;      &#34;LD4zPH3rZZkbSPN5ojHClA==&#34;,&#xA;      &#34;k6VTDL+fxGnbqAk/IPGlnQ==&#34;&#xA;    ],&#xA;    &#34;G/7q+D+DsqYAVnohcyuzgQ==&#34;: [&#xA;      &#34;yyhzQNC9UPFT5NwvhGsvqg==&#34;,&#xA;      &#34;ugZgSJOxFzPCX6LQaJzM3A==&#34;,&#xA;      &#34;g9KEtrzigl5TCrpvLCQU5A==&#34;,&#xA;      &#34;lShmgiPGgmUIO0VwzhSBRA==&#34;,&#xA;      &#34;pu8XvxoOXeKAI0tvpRRucg==&#34;,&#xA;      &#34;+N61/5529gFt7RkD8ooeKQ==&#34;,&#xA;      &#34;Mmh4dm/jzK4QVSJqQVsCDw==&#34;,&#xA;      &#34;vmet9boOEsf+RUsh5rJnEw==&#34;,&#xA;      &#34;ziMZexwNoFxp4mgVOJVBNQ==&#34;,&#xA;      &#34;t3CEDp5fZQ6D+aOizMiuSg==&#34;,&#xA;      &#34;P4mYk7npVU6t91mlbAb8QA==&#34;,&#xA;      &#34;eietxU2AL+GdeSQwh6n6XA==&#34;,&#xA;      &#34;kwKUYCnvi/GndNgicLw/RQ==&#34;,&#xA;      &#34;Mnnh2CmlXNNRCBXvqdG9ig==&#34;,&#xA;      &#34;3Z3QMUqCN4dQV+f8cjn1eA==&#34;,&#xA;      &#34;QEROZuK4q+zt8UbP6ZV8wg==&#34;,&#xA;      &#34;ySGl3ADUS8EeTeweiO86Aw==&#34;,&#xA;      &#34;uspznaGFEzt4cX0xZ36sYw==&#34;,&#xA;      &#34;KLrAiYCJHdmWQ2RaqUywlA==&#34;,&#xA;      &#34;Tcuyjettc5LT9G5wj3mSxw==&#34;,&#xA;      &#34;afNm575eldgXY3DOGUNdqQ==&#34;,&#xA;      &#34;epkSU4TSX3BVrueh1mbRzg==&#34;,&#xA;      &#34;EajCJi704nU1+LqESNMC1w==&#34;,&#xA;      &#34;b2D8D2g8yPwuRhswdqF0Rw==&#34;,&#xA;      &#34;3QDeWfKuntq5YxjjCuZXRQ==&#34;,&#xA;      &#34;bX7iB3AnaRh9Z+itWa3Xyw==&#34;,&#xA;      &#34;srcIw8ffB6famHHqmqImEw==&#34;,&#xA;      &#34;yyExMMKc3SPW2jNE01wTug==&#34;,&#xA;      &#34;cZD87tDO2q60EFy3BAZ33g==&#34;,&#xA;      &#34;x3SWTcEL2lgEvouAhmt6fQ==&#34;,&#xA;      &#34;GmBi7n85v8sX6ItoMSgvlQ==&#34;,&#xA;      &#34;bjAyJcmSN59FnAeiA6RMIg==&#34;&#xA;    ],&#xA;    &#34;Gm6VA87iOnaQ0rWR6oO9eA==&#34;: [&#xA;      &#34;u+ya+p/mAtLPAYAgbSPTTw==&#34;&#xA;    ],&#xA;    &#34;IQfQp74RcAWE7jHtQsMLHg==&#34;: [&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;&#xA;    ],&#xA;    &#34;LOfpAnA/2f7zE4SFJCrxVg==&#34;: [&#xA;      &#34;5OqCQlhu6kV+tAsgGEGuwQ==&#34;,&#xA;      &#34;Mxv06g47iCk7QIqi7Xbojw==&#34;&#xA;    ],&#xA;    &#34;MvKvHHnD0jaLaWpyHvkhgQ==&#34;: [&#xA;      &#34;WCGqond4znYKCRcm4xyPrg==&#34;,&#xA;      &#34;CtYegggqGbMfg16G/qfITQ==&#34;,&#xA;      &#34;qhu8cH6U47vSCL4GXDHHtA==&#34;,&#xA;      &#34;xZI5XEFq7Cuk3Mu3KyTdmg==&#34;,&#xA;      &#34;LD4zPH3rZZkbSPN5ojHClA==&#34;,&#xA;      &#34;k6VTDL+fxGnbqAk/IPGlnQ==&#34;&#xA;    ],&#xA;    &#34;NzkVb7F31E+Vxxz3PCS6tg==&#34;: [&#xA;      &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;,&#xA;      &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;&#xA;    ],&#xA;    &#34;PgPY5hWnihXRN45byvzY0g==&#34;: [&#xA;      &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;,&#xA;      &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;&#xA;    ],&#xA;    &#34;R1TkRM71ql+JWgz0VF5ESQ==&#34;: [&#xA;      &#34;1U/zi3CEao+52y8LKU0uvw==&#34;,&#xA;      &#34;bZ2m6J3EIvmTdjYJprlOKA==&#34;,&#xA;      &#34;khiBNMMi17UID6UagXI8LA==&#34;,&#xA;      &#34;CaLsKNvkpKlxKVBlUnje9Q==&#34;&#xA;    ],&#xA;    &#34;RAMuXEdVU4AJ/z4aiK/NNg==&#34;: [&#xA;      &#34;bNvH54V1y9cXsGaCXVwFVw==&#34;,&#xA;      &#34;QGq5D5QwQKPerzYOBVoSsg==&#34;,&#xA;      &#34;Jl0PQIP9L3ufSvQ2j71iww==&#34;,&#xA;      &#34;Qd2XnJZ3qaQ3AbyDXUaR2A==&#34;,&#xA;      &#34;Pj9V3uC2c9o+P6lTpzzGeA==&#34;&#xA;    ],&#xA;    &#34;RYsqO4ROpGMzzCO5WaTrlw==&#34;: [&#xA;      &#34;aWm6E1ULjtuw0ydmFnsI4A==&#34;&#xA;    ],&#xA;    &#34;RgdwX+VC70nXZ2E527PXaA==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;VbNyM3GfR5vEmJdFAiKqrA==&#34;: [&#xA;      &#34;vcYYj1nbYwczzoLG255iZQ==&#34;&#xA;    ],&#xA;    &#34;Wi4oa03apqVdR6okNeZiNA==&#34;: [&#xA;      &#34;KaoEuixR8E5nnpGZ1pG25w==&#34;,&#xA;      &#34;kgqUyyy6Fd5CUNREC3t1jg==&#34;,&#xA;      &#34;SNR1VT02i1HBHxqGRTeBAQ==&#34;,&#xA;      &#34;9sNDKQtqg7Z3gJr//JQlvg==&#34;,&#xA;      &#34;HuTBrVHKx7uaMtQjiqifKQ==&#34;,&#xA;      &#34;3cBlPR7Tm4BIC/+wflldAg==&#34;,&#xA;      &#34;bBymk1eoEM+tVYB+/Crz+g==&#34;,&#xA;      &#34;ZbWtFXr0WyByV4kCb3M6FA==&#34;,&#xA;      &#34;XtT5+z5+yMbpdsyfkLItzA==&#34;,&#xA;      &#34;Y++3+aMTeU3vX7BI4/zG6w==&#34;,&#xA;      &#34;fUdim7gaWpwZtynNz5GiKg==&#34;,&#xA;      &#34;qDLWFSo6NpfxWPhSeAS8zQ==&#34;,&#xA;      &#34;g44foSnimIkShQZtpEhjbQ==&#34;&#xA;    ],&#xA;    &#34;ZWeYh81MRCu1nh3mOyptIA==&#34;: [&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;&#xA;    ],&#xA;    &#34;bGWj1aSf0wvrecU/pdTv5A==&#34;: [&#xA;      &#34;08pa4udz9bnA9IOsE208DA==&#34;&#xA;    ],&#xA;    &#34;bHkSxcl6e1quNxLGb6uX8A==&#34;: [&#xA;      &#34;QopvyNp/5Ata9NdAUhFygw==&#34;,&#xA;      &#34;k6fjQGJuJ+9NXMFLa5+CgA==&#34;,&#xA;      &#34;Xce4H7xsVfrtYV2aXED7xA==&#34;&#xA;    ],&#xA;    &#34;bTSLWiizipO2axtmvXFuVg==&#34;: [&#xA;      &#34;YXTNVVKQsWY/LFuomB715g==&#34;,&#xA;      &#34;lnMcIzRPoETIbrbgdDGINA==&#34;,&#xA;      &#34;6j23t/n6B77cQMxfCeLKzA==&#34;&#xA;    ],&#xA;    &#34;brvvAQ6V7yp7QbUuk+W5Hg==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;d4b/e0nx+/vPWuPB7oDzPw==&#34;: [&#xA;      &#34;9JIazCQjSvYhpG9KE6d7Pg==&#34;,&#xA;      &#34;ZxTVeoHgmvhWXsV+xLzphA==&#34;,&#xA;      &#34;WHvU12ysgz1Ai1y1KSOiLA==&#34;,&#xA;      &#34;DJOf0vCfrT4GvRr/tBJhbg==&#34;,&#xA;      &#34;Y4A2Zm5xcsipvfluZVH5fA==&#34;,&#xA;      &#34;GezxxUl3QPWUTitg/VHmlQ==&#34;,&#xA;      &#34;jJNc2KwFwVg03DlaNN1nbA==&#34;,&#xA;      &#34;w4Wr213OT8TRxlHAy3MwPQ==&#34;,&#xA;      &#34;tne7uZ2E+Ev6QI7ctt3PxA==&#34;,&#xA;      &#34;pa+2016jZIT5xycgFHsAsQ==&#34;,&#xA;      &#34;l6iyFrb04z9eZxh35gAtVA==&#34;,&#xA;      &#34;gMRlXKqXSfP5n8UiPW430Q==&#34;,&#xA;      &#34;ZdGgPSEZdeQ3XJo0+ZpAXQ==&#34;,&#xA;      &#34;IwuADin5bagOGQErETBgWw==&#34;,&#xA;      &#34;CfS0L/tTata7W0FXXtQ4EQ==&#34;,&#xA;      &#34;MYYkxlB4Ank1zsdIh41apg==&#34;,&#xA;      &#34;c9VxNhSZmjnQmY3rI/q1PA==&#34;,&#xA;      &#34;s55QOTlka9E4jTdGv0d/FA==&#34;,&#xA;      &#34;OTqcMsspao5I6JZMETZ06w==&#34;,&#xA;      &#34;ELw1b1vO2YOtV7qNQijgCw==&#34;,&#xA;      &#34;aqMHDRnPT+3QNU/8tSwsog==&#34;,&#xA;      &#34;T2SiDOPpMK0bU0Y0qkOm1A==&#34;,&#xA;      &#34;wFMwqYmfC1KjDKz8vyBr4A==&#34;,&#xA;      &#34;/YwO4YLRGgF2uWU55V6+MQ==&#34;&#xA;    ],&#xA;    &#34;dUT53gagQO5Ac9Bdlu5dAw==&#34;: [&#xA;      &#34;NYWveHKKsIYIKl+vE8UEhw==&#34;&#xA;    ],&#xA;    &#34;dXglURzzdbLnOf14mab1Hg==&#34;: [&#xA;      &#34;EYo03ICovWfCjw2cKpwx4Q==&#34;,&#xA;      &#34;VzolVkOS5HseGzVTLzDMfA==&#34;,&#xA;      &#34;9xk1p07t4ZV999E3HyfhVA==&#34;,&#xA;      &#34;27BVJE6xR0Z84LzifDnFYA==&#34;,&#xA;      &#34;WWnQMI7f7f75SgC9Dcl+QQ==&#34;&#xA;    ],&#xA;    &#34;dobmrwm7aq9puvFHwNgXxw==&#34;: [&#xA;      &#34;08pa4udz9bnA9IOsE208DA==&#34;&#xA;    ],&#xA;    &#34;dv3AlW8tBL4D0mEPW7/Z2Q==&#34;: [&#xA;      &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;,&#xA;      &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;&#xA;    ],&#xA;    &#34;eF2QIdrTmJlWmjQTkhntow==&#34;: [&#xA;      &#34;5IA1PesIyj05J2Yx0YB4tQ==&#34;&#xA;    ],&#xA;    &#34;elSR7m8uLWd/kMl2jxTm/A==&#34;: [&#xA;      &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;,&#xA;      &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;&#xA;    ],&#xA;    &#34;evNF5YpSAxyFV7iWv3lSVw==&#34;: [&#xA;      &#34;yyhzQNC9UPFT5NwvhGsvqg==&#34;,&#xA;      &#34;ugZgSJOxFzPCX6LQaJzM3A==&#34;,&#xA;      &#34;g9KEtrzigl5TCrpvLCQU5A==&#34;,&#xA;      &#34;lShmgiPGgmUIO0VwzhSBRA==&#34;,&#xA;      &#34;pu8XvxoOXeKAI0tvpRRucg==&#34;,&#xA;      &#34;+N61/5529gFt7RkD8ooeKQ==&#34;,&#xA;      &#34;Mmh4dm/jzK4QVSJqQVsCDw==&#34;,&#xA;      &#34;vmet9boOEsf+RUsh5rJnEw==&#34;,&#xA;      &#34;ziMZexwNoFxp4mgVOJVBNQ==&#34;,&#xA;      &#34;t3CEDp5fZQ6D+aOizMiuSg==&#34;,&#xA;      &#34;P4mYk7npVU6t91mlbAb8QA==&#34;,&#xA;      &#34;eietxU2AL+GdeSQwh6n6XA==&#34;,&#xA;      &#34;kwKUYCnvi/GndNgicLw/RQ==&#34;,&#xA;      &#34;Mnnh2CmlXNNRCBXvqdG9ig==&#34;,&#xA;      &#34;3Z3QMUqCN4dQV+f8cjn1eA==&#34;,&#xA;      &#34;QEROZuK4q+zt8UbP6ZV8wg==&#34;,&#xA;      &#34;ySGl3ADUS8EeTeweiO86Aw==&#34;,&#xA;      &#34;uspznaGFEzt4cX0xZ36sYw==&#34;,&#xA;      &#34;KLrAiYCJHdmWQ2RaqUywlA==&#34;,&#xA;      &#34;Tcuyjettc5LT9G5wj3mSxw==&#34;,&#xA;      &#34;afNm575eldgXY3DOGUNdqQ==&#34;,&#xA;      &#34;epkSU4TSX3BVrueh1mbRzg==&#34;,&#xA;      &#34;EajCJi704nU1+LqESNMC1w==&#34;,&#xA;      &#34;b2D8D2g8yPwuRhswdqF0Rw==&#34;,&#xA;      &#34;3QDeWfKuntq5YxjjCuZXRQ==&#34;,&#xA;      &#34;bX7iB3AnaRh9Z+itWa3Xyw==&#34;,&#xA;      &#34;srcIw8ffB6famHHqmqImEw==&#34;,&#xA;      &#34;yyExMMKc3SPW2jNE01wTug==&#34;,&#xA;      &#34;cZD87tDO2q60EFy3BAZ33g==&#34;,&#xA;      &#34;x3SWTcEL2lgEvouAhmt6fQ==&#34;,&#xA;      &#34;GmBi7n85v8sX6ItoMSgvlQ==&#34;,&#xA;      &#34;bjAyJcmSN59FnAeiA6RMIg==&#34;&#xA;    ],&#xA;    &#34;fCmdLCR2Ix0ldnZL1Fa52A==&#34;: [&#xA;      &#34;MXRm//dBCnWFem5zffvqmA==&#34;,&#xA;      &#34;MDmWztEMrTY+VyVp5c+Fvw==&#34;&#xA;    ],&#xA;    &#34;hdNUjYIlrdEAtBWAggakAw==&#34;: [&#xA;      &#34;brAAPyN4siIQT5bxa9xu4g==&#34;,&#xA;      &#34;7DtFnnE8FjIpCQKunutpeg==&#34;,&#xA;      &#34;m8d/cgBRVljmHKGy6mUUXw==&#34;,&#xA;      &#34;ce9B0jxjyNiCfG4VtZhnVw==&#34;,&#xA;      &#34;k82HOcJqNkts86KJ0glvow==&#34;,&#xA;      &#34;AvPdNumiwGnBie+lo1du3A==&#34;&#xA;    ],&#xA;    &#34;iWqdRZmp08/Tx22qEtmjJg==&#34;: [&#xA;      &#34;mJA9Uto8Hh0tElNp2qoYaA==&#34;,&#xA;      &#34;oeIf5WAd0bERBmJCeLsqIg==&#34;,&#xA;      &#34;ZrZi02myDWWW0L5oPQj/cg==&#34;,&#xA;      &#34;uEg5UAxE9NNjF71OxdO7uQ==&#34;,&#xA;      &#34;G45dR+E8Wb+bEhCdwuqUDg==&#34;&#xA;    ],&#xA;    &#34;jErhz6PtXvAy/EPWJ425rA==&#34;: [&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;&#xA;    ],&#xA;    &#34;jKa8Us2cqGejhOc2/n5DDA==&#34;: [&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;&#xA;    ],&#xA;    &#34;kq4lGEwi4agkgAJAkDs9Ng==&#34;: [&#xA;      &#34;kwonOUycdcBenNhjZ1b//Q==&#34;,&#xA;      &#34;svo9ZP0wOZ7IXZp//n2f7g==&#34;,&#xA;      &#34;h7Lhy275V3QLvnBLGAulbw==&#34;&#xA;    ],&#xA;    &#34;krch6TQqNWzRi5F/dDkF+Q==&#34;: [&#xA;      &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;,&#xA;      &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;&#xA;    ],&#xA;    &#34;l5lCPjtOmPM8/LLh9+NjeQ==&#34;: [&#xA;      &#34;WxlxRC1KqAo8Mejv03fZGA==&#34;,&#xA;      &#34;ANq7+l7+5U6IDt9eU02u5w==&#34;,&#xA;      &#34;y2mOh8WlJTCvA6wlULAyvA==&#34;,&#xA;      &#34;F0zkrLGlbsix59P9mqoAOg==&#34;&#xA;    ],&#xA;    &#34;lCjIskl1HulEHShaXtgmwQ==&#34;: [&#xA;      &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;,&#xA;      &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;&#xA;    ],&#xA;    &#34;nwapLKtbHTjy1u8+aA0X+Q==&#34;: [&#xA;      &#34;h35IL7k4erNtmTSolINnjA==&#34;,&#xA;      &#34;TN8d5UGyH2D+dtBNYjKyKg==&#34;,&#xA;      &#34;dZ/H1sYv9QSX9VO93tlGLw==&#34;,&#xA;      &#34;PUY4fn57nsAU2qBLtgRtdw==&#34;,&#xA;      &#34;mj6UKCnVoHnC6YBWJGf/Ug==&#34;,&#xA;      &#34;WcYPrwv9PSVoVoof5MRsxQ==&#34;&#xA;    ],&#xA;    &#34;pZoLgWqHDgjhYQPevrtwdg==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;qN2BSWBeEFRJnExMNJ1S0A==&#34;: [&#xA;      &#34;fharKhY7OXyx+gXJAwiegw==&#34;,&#xA;      &#34;DRKFIYYNzLumACBV1CW/rw==&#34;,&#xA;      &#34;dUTZP+bcDNUqytJV02E1dQ==&#34;,&#xA;      &#34;tjx9raP+v/Zzj6SBJct3WA==&#34;,&#xA;      &#34;BxMnseA9J6OW2RWxSrlbyQ==&#34;,&#xA;      &#34;tBbOIOCaKVlwik7hH/baMQ==&#34;,&#xA;      &#34;1VnWeA5AZgybyD8+PiXyiw==&#34;&#xA;    ],&#xA;    &#34;qrPZzwjmppjOiQbrGk5IQA==&#34;: [&#xA;      &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;,&#xA;      &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;&#xA;    ],&#xA;    &#34;s66OGd0F2Pbemhmyrg2R9w==&#34;: [&#xA;      &#34;uTSYWROavw8Bf2n+4djlMg==&#34;,&#xA;      &#34;5rGwN3bKZLMvxcM/W4jj+A==&#34;,&#xA;      &#34;ASrdm9EROwWp9Ip2w7HH5w==&#34;,&#xA;      &#34;lAYsMZ/1tV9arAE2k+zsAQ==&#34;,&#xA;      &#34;uwoSIcSlln9YRd7N1Kc3KQ==&#34;,&#xA;      &#34;m619DfZfUke+jaTAnoZ2Xw==&#34;,&#xA;      &#34;WG/hQnqUufOh6/5/mlRi/Q==&#34;,&#xA;      &#34;swQXHeTg1VEUQHser/6eEQ==&#34;,&#xA;      &#34;nApP7wP3SU/Fk79xF589WA==&#34;,&#xA;      &#34;U5598afGvRaltva6Rjqnug==&#34;,&#xA;      &#34;n+1p0npJfBZ4vUpG1OFi6w==&#34;,&#xA;      &#34;1dwwvWkARnFe67yAAGVglQ==&#34;,&#xA;      &#34;0q/btA3zBEGWWmFxU7cNig==&#34;,&#xA;      &#34;meQYB1JR+XE3En/RrDfPvA==&#34;,&#xA;      &#34;GRlufCZFwHNK64OQNCFIcg==&#34;,&#xA;      &#34;+x9OyXfXk9PrekfsnPKwlg==&#34;&#xA;    ],&#xA;    &#34;tNSJ6slY9zv+TZ6de2MVDQ==&#34;: [&#xA;      &#34;B78vSIll2muNDyY3F7urzw==&#34;&#xA;    ],&#xA;    &#34;tYADP/V07/lE8Qno1R/hhg==&#34;: [&#xA;      &#34;08pa4udz9bnA9IOsE208DA==&#34;&#xA;    ],&#xA;    &#34;vqKK+x/7cGHNjLr4L7x4uQ==&#34;: [&#xA;      &#34;fXJD4KsFmfzjgWJPYHqTrQ==&#34;&#xA;    ],&#xA;    &#34;wkuBBC4B84P3b4K0fGF0OQ==&#34;: [&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;&#xA;    ],&#xA;    &#34;yYcMjCGhY/mc+KraTEHSJg==&#34;: [&#xA;      &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;,&#xA;      &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;&#xA;    ],&#xA;    &#34;zV4ikAKeqBYFSvXnkFMYgg==&#34;: [&#xA;      &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;,&#xA;      &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;&#xA;    ],&#xA;    &#34;zw9OGAXs3mWkBkmfKzbfqg==&#34;: [&#xA;      &#34;l8HSGkC4gSxCEUDns7KKfQ==&#34;&#xA;    ]&#xA;  },&#xA;  &#34;enrichments&#34;: {}&#xA;}&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-clair-scan-pod | container step-oci-attach-report: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw&#xA;Attaching clair-report-amd64.json to quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw@sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6&#xA;Executing: oras attach --no-tty --format go-template={{.digest}} --registry-config /home/oras/auth.json --artifact-type application/vnd.redhat.clair-report+json quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw@sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6 clair-report-amd64.json:application/vnd.redhat.clair-report+json&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-clair-scan-pod | container step-conftest-vulnerabilities: &#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/tekton/home/clair-result-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 7,&#xA;&#x9;&#x9;&#34;warnings&#34;: [&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched medium vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: coreutils-8.32-4+b1 (CVE-2016-2781)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_medium_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 1&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libexpat1-2.2.10-2+deb11u5 (CVE-2013-0340, CVE-2023-52426, CVE-2024-28757), libk5crypto3-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), passwd-1:4.8.1-1 (CVE-2007-5686, CVE-2013-4235, TEMP-0628843-DBAD28), libsystemd0-247.3-7+deb11u1 (CVE-2013-4392, CVE-2020-13529, CVE-2023-31437, CVE-2023-31438, CVE-2023-31439), gcc-9-base-9.3.0-22 (CVE-2023-4039), sysvinit-utils-2.96-7+deb11u1 (TEMP-0517018-A83CE6), libudev1-247.3-7+deb11u1 (CVE-2013-4392, CVE-2020-13529, CVE-2023-31437, CVE-2023-31438, CVE-2023-31439), tar-1.34+dfsg-1 (CVE-2005-2541, TEMP-0290435-0B57B5), libgcc-s1-10.2.1-6 (CVE-2023-4039), coreutils-8.32-4+b1 (CVE-2017-18018, CVE-2025-5278), perl-base-5.32.1-4+deb11u2 (CVE-2011-4116, CVE-2023-31486), libssl1.1-1.1.1n-0+deb11u3 (CVE-2025-27587), libblkid1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), login-1:4.8.1-1 (CVE-2007-5686, CVE-2013-4235, TEMP-0628843-DBAD28), libkrb5-3-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), apt-2.2.4 (CVE-2011-3374), libc6-2.31-13+deb11u5 (CVE-2010-4756, CVE-2018-20796, CVE-2019-1010022, CVE-2019-1010023, CVE-2019-1010024, CVE-2019-1010025, CVE-2019-9192), libgnutls30-3.7.1-5+deb11u2 (CVE-2011-3389), openssl-1.1.1n-0+deb11u3 (CVE-2025-27587), libpcre3-2:8.39-13 (CVE-2017-11164, CVE-2017-16231, CVE-2017-7245, CVE-2017-7246, CVE-2019-20838), libstdc++6-10.2.1-6 (CVE-2023-4039), gpgv-2.2.27-2+deb11u2 (CVE-2022-3219), libsmartcols1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libapt-pkg6.0-2.2.4 (CVE-2011-3374), libgssapi-krb5-2-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), libsqlite3-0-3.34.1-3 (CVE-2021-45346, CVE-2022-35737, CVE-2025-29088, CVE-2025-70873), mount-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libuuid1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libkrb5support0-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), libgcrypt20-1.8.7-6 (CVE-2018-6829, CVE-2024-2236), bash-5.1-2+deb11u1 (TEMP-0841856-B18BAF), bsdutils-1:2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), util-linux-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), gcc-10-base-10.2.1-6 (CVE-2023-4039), libpcre2-8-0-10.36-2+deb11u1 (CVE-2022-41409), libmount1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libc-bin-2.31-13+deb11u5 (CVE-2010-4756, CVE-2018-20796, CVE-2019-1010022, CVE-2019-1010023, CVE-2019-1010024, CVE-2019-1010025, CVE-2019-9192)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_low_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 89&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched unknown vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libexpat1-2.2.10-2+deb11u5 (CVE-2024-8176, CVE-2025-59375, CVE-2025-66382, CVE-2026-24515, CVE-2026-25210, CVE-2026-32776, CVE-2026-32777, CVE-2026-32778, CVE-2026-41080), libdb5.3-5.3.28+dfsg1-0.8 (CVE-2019-8457), passwd-1:4.8.1-1 (CVE-2024-56433), libsystemd0-247.3-7+deb11u1 (CVE-2026-40228), libudev1-247.3-7+deb11u1 (CVE-2026-40228), tar-1.34+dfsg-1 (CVE-2026-5704), libzstd1-1.4.8+dfsg-2.1 (CVE-2022-4899), ncurses-bin-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), libssl1.1-1.1.1n-0+deb11u3 (CVE-2026-28387, CVE-2026-28388, CVE-2026-28389, CVE-2026-28390, CVE-2026-31789), libblkid1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), login-1:4.8.1-1 (CVE-2024-56433), libtinfo6-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), libc6-2.31-13+deb11u5 (CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-8058, CVE-2026-0861, CVE-2026-0915, CVE-2026-4046, CVE-2026-4437, CVE-2026-4438), openssl-1.1.1n-0+deb11u3 (CVE-2026-28387, CVE-2026-28388, CVE-2026-28389, CVE-2026-28390, CVE-2026-31789), libpam0g-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), libncursesw6-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), libtasn1-6-4.16.0-2 (CVE-2025-13151), gpgv-2.2.27-2+deb11u2 (CVE-2025-30258, CVE-2025-68972), liblzma5-5.2.5-2.1~deb11u1 (CVE-2026-34743), zlib1g-1:1.2.11.dfsg-2+deb11u2 (CVE-2023-45853, CVE-2026-27171), libpam-modules-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), libsmartcols1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), dpkg-1.20.12 (CVE-2025-6297), libsqlite3-0-3.34.1-3 (CVE-2025-6965), mount-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libuuid1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libpam-modules-bin-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), libgcrypt20-1.8.7-6 (CVE-2021-33560), libpam-runtime-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), bash-5.1-2+deb11u1 (CVE-2022-3715), bsdutils-1:2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), util-linux-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), ncurses-base-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), libmount1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libc-bin-2.31-13+deb11u5 (CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-8058, CVE-2026-0861, CVE-2026-0915, CVE-2026-4046, CVE-2026-4437, CVE-2026-4438)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_unknown_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 88&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;]&#xA;&#x9;}&#xA;]&#xA;{&#34;vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:0,&#34;medium&#34;:0,&#34;low&#34;:0,&#34;unknown&#34;:0},&#34;unpatched_vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:0,&#34;medium&#34;:1,&#34;low&#34;:89,&#34;unknown&#34;:88}}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#34;, &#34;digests&#34;: [&#34;sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6&#34;]}}&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:59:07+00:00&#34;,&#34;note&#34;:&#34;Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-clamav-scan-pod | init container: prepare&#xA;2026/04/19 13:54:50 Entrypoint initialization&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-clamav-scan-pod | init container: place-scripts&#xA;2026/04/19 13:54:51 Decoded script /tekton/scripts/script-0-ctk8n&#xA;2026/04/19 13:54:51 Decoded script /tekton/scripts/script-1-pvl4v&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-clamav-scan-pod | container step-extract-and-scan-image: &#xA;Starting clamd ...&#xA;clamd is ready!&#xA;Detecting artifact type for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw@sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6.&#xA;Detected container image. Processing image manifests.&#xA;Running &#34;oc image extract&#34; on image of arch amd64&#xA;Scanning image for arch amd64. This operation may take a while.&#xA;&#xA;----------- SCAN SUMMARY -----------&#xA;Infected files: 0&#xA;Time: 33.479 sec (0 m 33 s)&#xA;Start Date: 2026:04:19 13:55:27&#xA;End Date:   2026:04:19 13:56:01&#xA;Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27975/Sat Apr 18 06:26:10 2026 Database version: 27975&#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 2&#xA;&#x9;}&#xA;]&#xA;{&#34;timestamp&#34;:&#34;1776606961&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1776606961&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1776606961&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#34;, &#34;digests&#34;: [&#34;sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6&#34;]}}&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-clamav-scan-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e@sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;Preparing clamscan-result-amd64.log&#xA;Preparing clamscan-ec-test-amd64.json&#xA;Uploading 1ef7a77e82c3 clamscan-ec-test-amd64.json&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading 834fcb188831 clamscan-result-amd64.log&#xA;Uploaded  834fcb188831 clamscan-result-amd64.log&#xA;Uploaded  1ef7a77e82c3 clamscan-ec-test-amd64.json&#xA;Uploading ea7b91450426 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  ea7b91450426 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e@sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6&#xA;Digest: sha256:ea7b914504261312c2fa2091793feae0815be51bed624741174fb149c79c5236&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-clone-repository-pod | init container: prepare&#xA;2026/04/19 13:52:44 Entrypoint initialization&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-clone-repository-pod | init container: place-scripts&#xA;2026/04/19 13:52:44 Decoded script /tekton/scripts/script-0-js75p&#xA;2026/04/19 13:52:44 Decoded script /tekton/scripts/script-1-t24cb&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-clone-repository-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1776606769.0220954,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1776606769.2501888,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/devfile-sample-python-basic @ d2388fe1871d355bc27342e92fa9ff21797dba3e (grafted, HEAD) in path /workspace/output/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1776606769.2502394,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1776606769.2793224,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /workspace/output/source&#34;}&#xA;Merge option disabled. Using checked-out revision d2388fe1871d355bc27342e92fa9ff21797dba3e directly.&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-clone-repository-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-init-pod | init container: prepare&#xA;2026/04/19 13:52:32 Entrypoint initialization&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-init-pod | container step-init: &#xA;time=&#34;2026-04-19T13:52:34Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-19T13:52:34Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-19T13:52:34Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-19T13:52:34Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-19T13:52:34Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-19T13:52:34Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-19T13:52:34Z&#34; level=info msg=&#34;Cache proxy is disabled in param or in backend&#34;&#xA;time=&#34;2026-04-19T13:52:34Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-19T13:52:34Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-prefetch-dependencies-pod | init container: prepare&#xA;2026/04/19 13:52:54 Entrypoint initialization&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-prefetch-dependencies-pod | init container: place-scripts&#xA;2026/04/19 13:52:55 Decoded script /tekton/scripts/script-0-7jh9l&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-prefetch-dependencies-pod | container step-prefetch-dependencies: &#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;time=&#34;2026-04-19T13:53:01Z&#34; level=debug msg=&#34;Starting prefetch-dependencies&#34;&#xA;time=&#34;2026-04-19T13:53:01Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-19T13:53:01Z&#34; level=info msg=&#34;Not using package registry proxy because allow-package-registry-proxy is not set to `true` on the cluster level&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-04-19T13:53:01Z&#34; level=info msg=&#34;[param] source-dir: /workspace/source/source&#34;&#xA;time=&#34;2026-04-19T13:53:01Z&#34; level=info msg=&#34;[param] output-dir: /workspace/source/cachi2/output&#34;&#xA;time=&#34;2026-04-19T13:53:01Z&#34; level=info msg=&#34;[param] sbom-format: spdx&#34;&#xA;time=&#34;2026-04-19T13:53:01Z&#34; level=info msg=&#34;[param] mode: strict&#34;&#xA;time=&#34;2026-04-19T13:53:01Z&#34; level=info msg=&#34;[param] output-dir-mount-point: /cachi2/output&#34;&#xA;time=&#34;2026-04-19T13:53:01Z&#34; level=info msg=&#34;[param] env-files: [/workspace/source/cachi2/cachi2.env]&#34;&#xA;time=&#34;2026-04-19T13:53:01Z&#34; level=info msg=&#34;[param] git-auth-directory: /workspace/git-basic-auth&#34;&#xA;time=&#34;2026-04-19T13:53:02Z&#34; level=info msg=&#34;hermeto [stdout] hermeto 0.50.1&#34; logger=CliExecutor&#xA;time=&#34;2026-04-19T13:53:02Z&#34; level=warning msg=&#34;No input provided; skipping prefetch-dependencies&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-04-19T13:53:02Z&#34; level=debug msg=&#34;Finished prefetch-dependencies&#34;&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-push-dockerfile-pod | init container: prepare&#xA;2026/04/19 13:54:56 Entrypoint initialization&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-push-dockerfile-pod | init container: working-dir-initializer&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-push-dockerfile-pod | container step-push: &#xA;time=&#34;2026-04-19T13:55:11Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#34;&#xA;time=&#34;2026-04-19T13:55:11Z&#34; level=info msg=&#34;[param] image-digest: sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6&#34;&#xA;time=&#34;2026-04-19T13:55:11Z&#34; level=info msg=&#34;[param] containerfile: docker/Dockerfile&#34;&#xA;time=&#34;2026-04-19T13:55:11Z&#34; level=info msg=&#34;[param] context: .&#34;&#xA;time=&#34;2026-04-19T13:55:11Z&#34; level=info msg=&#34;[param] tag-suffix: .dockerfile&#34;&#xA;time=&#34;2026-04-19T13:55:11Z&#34; level=info msg=&#34;[param] artifact-type: application/vnd.konflux.dockerfile&#34;&#xA;time=&#34;2026-04-19T13:55:11Z&#34; level=info msg=&#34;[param] source: source&#34;&#xA;time=&#34;2026-04-19T13:55:11Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-04-19T13:55:11Z&#34; level=info msg=&#34;[param] alternative-filename: Dockerfile&#34;&#xA;time=&#34;2026-04-19T13:55:13Z&#34; level=info msg=&#34;oras [stdout] quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw@sha256:27fc36bb85db42d22d7fed5e98194399a41a12df3f5bcbd99fde66af0d475ab3&#34; logger=CliExecutor&#xA;time=&#34;2026-04-19T13:55:13Z&#34; level=info msg=&#34;Containerfile &#39;/workspace/workspace/source/docker/Dockerfile&#39; is pushed to registry with tag: sha256-adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6.dockerfile&#34;&#xA;{&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw@sha256:27fc36bb85db42d22d7fed5e98194399a41a12df3f5bcbd99fde66af0d475ab3&#34;}&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-sast-shell-check-pod | init container: prepare&#xA;2026/04/19 13:54:53 Entrypoint initialization&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-sast-shell-check-pod | init container: place-scripts&#xA;2026/04/19 13:54:56 Decoded script /tekton/scripts/script-0-g7kwb&#xA;2026/04/19 13:54:56 Decoded script /tekton/scripts/script-1-q6rhp&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-sast-shell-check-pod | init container: working-dir-initializer&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-sast-shell-check-pod | container step-sast-shell-check: &#xA;+ source /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=test-comp-iwsw&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: test-comp-iwsw&#39;&#xA;INFO: The PROJECT_NAME used is: test-comp-iwsw&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;++ rpm -q --queryformat &#39;%{NAME}-%{VERSION}-%{RELEASE}\n&#39; ShellCheck&#xA;+ PACKAGE_VERSION=ShellCheck-0.10.0-3.el9&#xA;+ OUTPUT_FILE=shellcheck-results.json&#xA;+ SOURCE_CODE_DIR=/workspace/workspace/source&#xA;+ declare -a ALL_TARGETS&#xA;+ IFS=,&#xA;+ read -ra TARGET_ARRAY&#xA;+ for d in &#34;${TARGET_ARRAY[@]}&#34;&#xA;+ potential_path=/workspace/workspace/source/.&#xA;++ realpath -m /workspace/workspace/source/.&#xA;+ resolved_path=/workspace/workspace/source&#xA;+ [[ /workspace/workspace/source == \/\w\o\r\k\s\p\a\c\e\/\w\o\r\k\s\p\a\c\e\/\s\o\u\r\c\e* ]]&#xA;+ ALL_TARGETS+=(&#34;$resolved_path&#34;)&#xA;+ &#39;[&#39; -z &#39;&#39; &#39;]&#39;&#xA;+ &#39;[&#39; -r /sys/fs/cgroup/cpu.max &#39;]&#39;&#xA;+ read -r quota period&#xA;+ &#39;[&#39; 800000 &#39;!=&#39; max &#39;]&#39;&#xA;+ &#39;[&#39; -n 100000 &#39;]&#39;&#xA;+ &#39;[&#39; 100000 -gt 0 &#39;]&#39;&#xA;+ export SC_JOBS=8&#xA;+ SC_JOBS=8&#xA;INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh&#xA;+ echo &#39;INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh&#39;&#xA;+ /usr/share/csmock/scripts/run-shellcheck.sh /workspace/workspace/source&#xA;Looking for shell scripts................ done&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/applypatch-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/post-update.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/prepare-commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-applypatch.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-merge-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-push.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-rebase.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-receive.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/push-to-checkout.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/sendemail-validate.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/update.sample&#xA;+ CSGREP_OPTS=(--mode=json --strip-path-prefix=&#34;$SOURCE_CODE_DIR&#34;/ --remove-duplicates --embed-context=3 --set-scan-prop=&#34;ShellCheck:${PACKAGE_VERSION}&#34;)&#xA;+ [[ true == \t\r\u\e ]]&#xA;+ CSGREP_EVENT_FILTER=&#39;\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2218|2224|2225|2242|2256|2258|2261)\]$&#39;&#xA;+ CSGREP_OPTS+=(--event=&#34;$CSGREP_EVENT_FILTER&#34;)&#xA;+ csgrep --mode=json --strip-path-prefix=/workspace/workspace/source/ --remove-duplicates --embed-context=3 --set-scan-prop=ShellCheck:ShellCheck-0.10.0-3.el9 &#39;--event=\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|2218|2224|2225|2242|2256|2258|2261)\]$&#39; ./shellcheck-results/empty.json ./shellcheck-results/sc-106.json ./shellcheck-results/sc-116.json ./shellcheck-results/sc-118.json ./shellcheck-results/sc-122.json ./shellcheck-results/sc-73.json ./shellcheck-results/sc-76.json ./shellcheck-results/sc-77.json ./shellcheck-results/sc-79.json ./shellcheck-results/sc-83.json ./shellcheck-results/sc-84.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;+ echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... + curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;ShellCheck results have been saved to shellcheck-results.json&#xA;+ echo &#39;ShellCheck results have been saved to shellcheck-results.json&#39;&#xA;+ csgrep --mode=evtstat shellcheck-results.json&#xA;+ csgrep --mode=sarif shellcheck-results.json&#xA;+ TEST_OUTPUT=&#xA;+ parse_test_output sast-shell-check sarif shellcheck-results.sarif&#xA;+ TEST_NAME=sast-shell-check&#xA;+ TEST_RESULT_FORMAT=sarif&#xA;+ TEST_RESULT_FILE=shellcheck-results.sarif&#xA;+ &#39;[&#39; -z sast-shell-check &#39;]&#39;&#xA;+ &#39;[&#39; -z sarif &#39;]&#39;&#xA;+ &#39;[&#39; -z shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; &#39;!&#39; -f shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; sarif = sarif &#39;]&#39;&#xA;+++ jq -rce &#39;(if (.runs[].results | length &gt; 0) then &#34;FAILURE&#34; else &#34;SUCCESS&#34; end)&#39; shellcheck-results.sarif&#xA;+++ jq -rce &#39;(.runs[].results | length)&#39; shellcheck-results.sarif&#xA;++ make_result_json -r SUCCESS -f 0&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ FAILURES=0&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-04-19T13:56:50+00:00 --arg result SUCCESS --arg note &#39;For details, check Tekton task log.&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:50+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:50+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ TEST_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:50+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:50+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ jq .failures&#xA;+ &#39;[&#39; 0 -gt 0 &#39;]&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:50+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:50+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-sast-shell-check-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e@sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6 shellcheck-results.sarif:application/sarif+json&#xA;Preparing shellcheck-results.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading 3b606a9dd3a1 shellcheck-results.sarif&#xA;Uploaded  3b606a9dd3a1 shellcheck-results.sarif&#xA;Uploading 99a747d3915b application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  99a747d3915b application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e@sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6&#xA;Digest: sha256:99a747d3915b04b7c75ac4300bb422e0ec0cc53b18d90b27f6a093971f5d66a5&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-sast-snyk-check-pod | init container: prepare&#xA;2026/04/19 13:54:53 Entrypoint initialization&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-sast-snyk-check-pod | init container: place-scripts&#xA;2026/04/19 13:54:56 Decoded script /tekton/scripts/script-0-mgtgm&#xA;2026/04/19 13:54:56 Decoded script /tekton/scripts/script-1-8swlg&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-sast-snyk-check-pod | init container: working-dir-initializer&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-sast-snyk-check-pod | container step-sast-snyk-check: &#xA;INFO: The PROJECT_NAME used is: test-comp-iwsw&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;{&#34;result&#34;:&#34;SKIPPED&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:49+00:00&#34;,&#34;note&#34;:&#34;Task sast-snyk-check skipped: If you wish to use the Snyk code SAST task, please create a secret name snyk-secret with the key &#39;snyk_token&#39; containing the Snyk token by following the steps given [here](https://konflux-ci.dev/docs/testing/build/snyk/)&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-sast-snyk-check-pod | container step-upload: &#xA;No sast_snyk_check_out.sarif exists. Skipping upload.&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-sast-unicode-check-pod | init container: prepare&#xA;2026/04/19 13:54:54 Entrypoint initialization&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-sast-unicode-check-pod | init container: place-scripts&#xA;2026/04/19 13:54:56 Decoded script /tekton/scripts/script-0-vq4sx&#xA;2026/04/19 13:54:56 Decoded script /tekton/scripts/script-1-xv2c4&#xA;&#xA; pod: test-comp-iwsw-on-pull-request-cqm7h-sast-unicode-check-pod | init container: working-dir-initializer&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-sast-unicode-check-pod | container step-sast-unicode-check: &#xA;+ . /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=test-comp-iwsw&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: test-comp-iwsw&#39;&#xA;INFO: The PROJECT_NAME used is: test-comp-iwsw&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;+ SCAN_PROP=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58&#xA;+ FUC_EXIT_CODE=0&#xA;+ LANG=en_US.utf8&#xA;+ find_unicode_control.py -p bidi -v -d -t /workspace/workspace/source&#xA;+ [[ 0 -ne 0 ]]&#xA;+ sed -i raw_sast_unicode_check_out.txt -E -e &#39;s|(.*:[0-9]+)(.*)|\1: warning:\2|&#39; -e &#39;s|^|Error: UNICONTROL_WARNING:\n|&#39;&#xA;+ CSGERP_OPTS=(--mode=json --remove-duplicates --embed-context=3 --set-scan-prop=&#34;${SCAN_PROP}&#34; --strip-path-prefix=&#34;${SOURCE_CODE_DIR}&#34;/source/)&#xA;+ csgrep --mode=json --remove-duplicates --embed-context=3 --set-scan-prop=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58 --strip-path-prefix=/workspace/workspace/source/ raw_sast_unicode_check_out.txt&#xA;+ csgrep --mode=evtstat processed_sast_unicode_check_out.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;+ echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... + curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;+ mv processed_sast_unicode_check_out.json sast_unicode_check_out.json&#xA;+ csgrep --mode=sarif sast_unicode_check_out.json&#xA;+ [[ 0 -eq 0 ]]&#xA;+ note=&#39;Task sast-unicode-check success: No finding was detected&#39;&#xA;++ make_result_json -r SUCCESS -t &#39;Task sast-unicode-check success: No finding was detected&#39;&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ NOTE=&#39;Task sast-unicode-check success: No finding was detected&#39;&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-04-19T13:56:50+00:00 --arg result SUCCESS --arg note &#39;Task sast-unicode-check success: No finding was detected&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:50+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:50+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ ERROR_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:50+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:50+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:50+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: test-comp-iwsw-on-pull-request-cqm7h-sast-unicode-check-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e@sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6 sast_unicode_check_out.sarif:application/sarif+json&#xA;Preparing sast_unicode_check_out.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading 1da9b99b8b41 sast_unicode_check_out.sarif&#xA;Uploaded  1da9b99b8b41 sast_unicode_check_out.sarif&#xA;Uploading 4457b9aab2bf application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  4457b9aab2bf application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-iwsw:on-pr-d2388fe1871d355bc27342e92fa9ff21797dba3e@sha256:adf29095c733ccbf19246873768b13ac251c03ff8802aa304c072f44803c27e6&#xA;Digest: sha256:4457b9aab2bf6a94883a8ad09f17c22b6c9895bb37658aec30e1484eeaa85025&#xA;No excluded-findings.json exists. Skipping upload.&#xA;New PipelineRun test-comp-iwsw-on-pull-request-485fb found after retrigger for component build-e2e-kzwe/test-comp-iwsw&#xA;PipelineRun test-comp-iwsw-on-pull-request-485fb found for Component build-e2e-kzwe/test-comp-iwsw&#xA;PipelineRun test-comp-iwsw-on-pull-request-485fb reason: ResolvingTaskRef&#xA;PipelineRun test-comp-iwsw-on-pull-request-485fb reason: Running&#xA;PipelineRun test-comp-iwsw-on-pull-request-485fb reason: Running&#xA;PipelineRun test-comp-iwsw-on-pull-request-485fb reason: Running&#xA;PipelineRun test-comp-iwsw-on-pull-request-485fb reason: Running&#xA;PipelineRun test-comp-iwsw-on-pull-request-485fb reason: Running&#xA;PipelineRun test-comp-iwsw-on-pull-request-485fb reason: Running&#xA;PipelineRun test-comp-iwsw-on-pull-request-485fb reason: Running&#xA;PipelineRun test-comp-iwsw-on-pull-request-485fb reason: Running&#xA;PipelineRun test-comp-iwsw-on-pull-request-485fb reason: Completed&#xA;&lt; Exit [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:356 @ 04/19/26 14:04:55.659 (3m16.762s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:04:55.659&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:04:55.659 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) should push Dockerfile to registry [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="3.927288039">
              <system-err>&gt; Enter [It] should push Dockerfile to registry - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:366 @ 04/19/26 14:04:55.66&#xA;&lt; Exit [It] should push Dockerfile to registry - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:366 @ 04/19/26 14:04:59.587 (3.927s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:04:59.587&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:04:59.587 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) floating tags are created successfully [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.000396397">
              <skipped message="skipped - floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic"></skipped>
              <system-err>&gt; Enter [It] floating tags are created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:378 @ 04/19/26 14:04:59.588&#xA;[SKIPPED] floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:380 @ 04/19/26 14:04:59.588&#xA;&lt; Exit [It] floating tags are created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:378 @ 04/19/26 14:04:59.588 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:04:59.588&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:04:59.588 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) image manifest mediaType is correct [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.313481342">
              <system-err>&gt; Enter [It] image manifest mediaType is correct - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:395 @ 04/19/26 14:04:59.588&#xA;&lt; Exit [It] image manifest mediaType is correct - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:395 @ 04/19/26 14:04:59.901 (313ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:04:59.902&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:04:59.902 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) check for source images if enabled in pipeline [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.344383772">
              <skipped message="skipped - Skipping source image check since it is not enabled in the pipeline"></skipped>
              <system-err>&gt; Enter [It] check for source images if enabled in pipeline - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:420 @ 04/19/26 14:04:59.902&#xA;Source build is enabled: false&#xA;[SKIPPED] Skipping source image check since it is not enabled in the pipeline&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:440 @ 04/19/26 14:05:00.246&#xA;&lt; Exit [It] check for source images if enabled in pipeline - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:420 @ 04/19/26 14:05:00.246 (344ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:05:00.246&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:05:00.247 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build should have Pipeline Records [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="0.44962977">
              <system-err>&gt; Enter [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:477 @ 04/19/26 14:05:00.247&#xA;&lt; Exit [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:477 @ 04/19/26 14:05:00.406 (159ms)&#xA;&gt; Enter [It] should have Pipeline Records - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:498 @ 04/19/26 14:05:00.406&#xA;records for PipelineRun test-comp-iwsw-on-pull-request-485fb:&#xA;&amp;{[{build-e2e-kzwe/results/f47c0070-27be-4ae3-9cb2-2cf4a6497e57/records/8dce4a47-4170-4a1d-9738-96ee3fae1520 0e2b78e3-760b-4c32-ba70-62d5dddf4d53 0e2b78e3-760b-4c32-ba70-62d5dddf4d53} {build-e2e-kzwe/results/f47c0070-27be-4ae3-9cb2-2cf4a6497e57/records/054bc9de-7e34-4c5f-8904-b6820a3e1bf7 2cc74de6-0ffc-46e3-ad47-52b591d5d0c5 2cc74de6-0ffc-46e3-ad47-52b591d5d0c5} {build-e2e-kzwe/results/f47c0070-27be-4ae3-9cb2-2cf4a6497e57/records/b15dbfa4-1a51-45f0-8541-3771f525a99a 35537bd6-f2d6-47b6-bec5-da89560b6031 35537bd6-f2d6-47b6-bec5-da89560b6031} {build-e2e-kzwe/results/f47c0070-27be-4ae3-9cb2-2cf4a6497e57/records/b8c07688-48f7-4e58-bc81-f594bc32c263 4364ef8d-17a5-4c31-bc58-a36cfb8d5857 4364ef8d-17a5-4c31-bc58-a36cfb8d5857} {build-e2e-kzwe/results/f47c0070-27be-4ae3-9cb2-2cf4a6497e57/records/c243b07c-dd5f-46f5-b860-8d20b3dc1116 51f8d682-4769-4230-a051-4a1a288e6365 51f8d682-4769-4230-a051-4a1a288e6365} {build-e2e-kzwe/results/f47c0070-27be-4ae3-9cb2-2cf4a6497e57/records/e5c0e930-faf9-4be2-b1ea-ff17eec43f8c 6fb61ab8-a5d0-48c2-95e3-db5fbe965cec 6fb61ab8-a5d0-48c2-95e3-db5fbe965cec} {build-e2e-kzwe/results/f47c0070-27be-4ae3-9cb2-2cf4a6497e57/records/f47c0070-27be-4ae3-9cb2-2cf4a6497e57 90a717e8-037d-4d9f-9608-c86ffb4579d4 90a717e8-037d-4d9f-9608-c86ffb4579d4} {build-e2e-kzwe/results/f47c0070-27be-4ae3-9cb2-2cf4a6497e57/records/d436aaba-94b6-4084-8d34-ddaec23243ee 96d3f5ac-90dc-41b6-bc18-968ed66458e7 96d3f5ac-90dc-41b6-bc18-968ed66458e7} {build-e2e-kzwe/results/f47c0070-27be-4ae3-9cb2-2cf4a6497e57/records/3c957b6c-199d-4918-be18-c49d626ed166 a7bbbe4b-835d-433d-b635-1f03cb4777e7 a7bbbe4b-835d-433d-b635-1f03cb4777e7} {build-e2e-kzwe/results/f47c0070-27be-4ae3-9cb2-2cf4a6497e57/records/58a3cd3f-ffc6-4e1e-bd0c-fbb03e2c24aa b656b85b-0c98-412e-acc0-780edc0acec4 b656b85b-0c98-412e-acc0-780edc0acec4} {build-e2e-kzwe/results/f47c0070-27be-4ae3-9cb2-2cf4a6497e57/records/2812e0f6-4246-446d-b660-845396363fc5 bf9a93ff-d200-486f-9594-64d078df339b bf9a93ff-d200-486f-9594-64d078df339b} {build-e2e-kzwe/results/f47c0070-27be-4ae3-9cb2-2cf4a6497e57/records/81e25bfe-f03d-45b7-88a0-4e7177dc7c23 cffccb41-7d75-482c-838f-7634466c4374 cffccb41-7d75-482c-838f-7634466c4374} {build-e2e-kzwe/results/f47c0070-27be-4ae3-9cb2-2cf4a6497e57/records/327f68a3-924e-446b-af62-703f960fb81e d148e605-330b-4f3e-8782-de231f3b0e86 d148e605-330b-4f3e-8782-de231f3b0e86} {build-e2e-kzwe/results/f47c0070-27be-4ae3-9cb2-2cf4a6497e57/records/a8ac28f4-5f0f-43a1-85cc-d7812e38f7af d30ce2a7-4ee7-433e-a98e-8d1e53734679 d30ce2a7-4ee7-433e-a98e-8d1e53734679} {build-e2e-kzwe/results/f47c0070-27be-4ae3-9cb2-2cf4a6497e57/records/d0746ff9-8263-4d38-92e0-8ece26e82403 e37d6b3b-7453-45cd-874d-9be9e56a42bd e37d6b3b-7453-45cd-874d-9be9e56a42bd} {build-e2e-kzwe/results/f47c0070-27be-4ae3-9cb2-2cf4a6497e57/records/6c6158fd-c6c6-489e-a666-dee0cc15eb8a f7ac7f27-df0f-4a3f-aff7-3459d9353927 f7ac7f27-df0f-4a3f-aff7-3459d9353927}]}&#xA;&lt; Exit [It] should have Pipeline Records - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:498 @ 04/19/26 14:05:00.696 (290ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:05:00.696&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:05:00.697 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build should have Pipeline Logs [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.356638543">
              <system-err>&gt; Enter [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:540 @ 04/19/26 14:05:00.697&#xA;&lt; Exit [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:540 @ 04/19/26 14:05:01.054 (356ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:05:01.054&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:05:01.054 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry verify-enterprise-contract check should pass [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry should have Hermeto content in the SBOM in case the build was hermetic [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.055678576">
              <skipped message="skipped - Hermetic build is not enabled, skipping the test"></skipped>
              <system-err>&gt; Enter [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:550 @ 04/19/26 14:05:01.054&#xA;&lt; Exit [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:550 @ 04/19/26 14:05:01.11 (55ms)&#xA;&gt; Enter [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:661 @ 04/19/26 14:05:01.11&#xA;[SKIPPED] Hermetic build is not enabled, skipping the test&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:663 @ 04/19/26 14:05:01.11&#xA;&lt; Exit [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:661 @ 04/19/26 14:05:01.11 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:05:01.11&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:05:01.11 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) build-definitions ec pipelines runs ec pipeline pipelines/enterprise-contract.yaml [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="176.218377166">
              <system-err>&gt; Enter [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:356 @ 04/19/26 14:05:01.111&#xA;PipelineRun test-comp-yssu-on-pull-request-tfdwd found for Component build-e2e-kzwe/test-comp-yssu&#xA;PipelineRun test-comp-yssu-on-pull-request-tfdwd reason: Failed&#xA;attempt 1/3: PipelineRun &#34;test-comp-yssu-on-pull-request-tfdwd&#34; failed: &#xA; pod: test-comp-yssu-on-pull-request-tfdwd-apply-tags-pod | init container: prepare&#xA;2026/04/19 13:55:00 Entrypoint initialization&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-apply-tags-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-04-19T13:55:02Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#34;&#xA;time=&#34;2026-04-19T13:55:02Z&#34; level=info msg=&#34;[param] digest: sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37&#34;&#xA;time=&#34;2026-04-19T13:55:02Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-04-19T13:55:03Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-build-container-pod | init container: prepare&#xA;2026/04/19 13:53:22 Entrypoint initialization&#xA;&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-build-container-pod | init container: place-scripts&#xA;2026/04/19 13:53:31 Decoded script /tekton/scripts/script-1-fg824&#xA;2026/04/19 13:53:31 Decoded script /tekton/scripts/script-2-v2jct&#xA;2026/04/19 13:53:31 Decoded script /tekton/scripts/script-3-r7pd5&#xA;2026/04/19 13:53:31 Decoded script /tekton/scripts/script-4-pgf4r&#xA;2026/04/19 13:53:31 Decoded script /tekton/scripts/script-5-xdbbc&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-build-container-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.l8YhZy/auth-MrPMxj.json quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:e5afa59a44d24608a15038d8e22d40e4f32f8c7e339720c865fd307e60d65abf --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:e5afa59a44d24608a15038d8e22d40e4f32f8c7e339720c865fd307e60d65abf to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-build-container-pod | container step-build: &#xA;[2026-04-19T13:53:35,738360883+00:00] Validate context path&#xA;[2026-04-19T13:53:35,741991432+00:00] Update CA trust&#xA;[2026-04-19T13:53:35,743112319+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-04-19T13:53:38,358620686+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-04-19T13:53:38,366495394+00:00] Prepare system (architecture: x86_64)&#xA;[2026-04-19T13:53:38,422279099+00:00] Setup prefetched&#xA;Trying to pull quay.io/devfile/python:slim...&#xA;Getting image source signatures&#xA;Copying blob sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#xA;Copying blob sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#xA;Copying blob sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#xA;Copying blob sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#xA;Copying blob sha256:30fb943195a7f7cee90a9c67461c338d1d76a7004d2f94792b774ef71d875a02&#xA;Copying config sha256:04f51101c1b979fb8a45a5332bfa8ed2c60f613ea396c3edd40f3d91702b24ef&#xA;Writing manifest to image destination&#xA;[2026-04-19T13:53:58,024462695+00:00] Unsetting proxy&#xA;{&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;d981b3febb34efc636b69c342ae5be53aa224b90&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;d981b3febb34efc636b69c342ae5be53aa224b90&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#34;,&#xA;  &#34;quay.expires-after&#34;: &#34;6h&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-04-19T13:53:38Z&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-04-19T13:53:38Z&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;&#xA;}&#xA;[2026-04-19T13:53:58,069518722+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-04-19T13:53:58,072646650+00:00] Add secrets&#xA;[2026-04-19T13:53:58,080044717+00:00] Run buildah build&#xA;[2026-04-19T13:53:58,081123827+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=d981b3febb34efc636b69c342ae5be53aa224b90 --label org.opencontainers.image.revision=d981b3febb34efc636b69c342ae5be53aa224b90 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-python-basic --label quay.expires-after=6h --label build-date=2026-04-19T13:53:38Z --label org.opencontainers.image.created=2026-04-19T13:53:38Z --annotation org.opencontainers.image.revision=d981b3febb34efc636b69c342ae5be53aa224b90 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-python-basic --annotation org.opencontainers.image.created=2026-04-19T13:53:38Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.UIYFVx -t quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90 . &#xA;STEP 1/11: FROM quay.io/devfile/python:slim&#xA;STEP 2/11: EXPOSE 8081/tcp&#xA;STEP 3/11: ENV FLASK_PORT=8081&#xA;STEP 4/11: WORKDIR /projects&#xA;STEP 5/11: COPY requirements.txt .&#xA;STEP 6/11: RUN pip install -r requirements.txt&#xA;Collecting Flask==2.1.0&#xA;  Downloading Flask-2.1.0-py3-none-any.whl (95 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 95.2/95.2 kB 20.7 MB/s eta 0:00:00&#xA;Collecting Werkzeug&gt;=2.0&#xA;  Downloading werkzeug-3.1.8-py3-none-any.whl (226 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 226.5/226.5 kB 98.4 MB/s eta 0:00:00&#xA;Collecting Jinja2&gt;=3.0&#xA;  Downloading jinja2-3.1.6-py3-none-any.whl (134 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 134.9/134.9 kB 98.4 MB/s eta 0:00:00&#xA;Collecting itsdangerous&gt;=2.0&#xA;  Downloading itsdangerous-2.2.0-py3-none-any.whl (16 kB)&#xA;Collecting click&gt;=8.0&#xA;  Downloading click-8.3.2-py3-none-any.whl (108 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 108.4/108.4 kB 103.8 MB/s eta 0:00:00&#xA;Collecting MarkupSafe&gt;=2.0&#xA;  Downloading markupsafe-3.0.3-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (22 kB)&#xA;Installing collected packages: MarkupSafe, itsdangerous, click, Werkzeug, Jinja2, Flask&#xA;Successfully installed Flask-2.1.0 Jinja2-3.1.6 MarkupSafe-3.0.3 Werkzeug-3.1.8 click-8.3.2 itsdangerous-2.2.0&#xA;WARNING: Running pip as the &#39;root&#39; user can result in broken permissions and conflicting behaviour with the system package manager. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv&#xA;&#xA;[notice] A new release of pip available: 22.3.1 -&gt; 26.0.1&#xA;[notice] To update, run: pip install --upgrade pip&#xA;STEP 7/11: COPY . .&#xA;STEP 8/11: CMD [ &#34;python&#34;, &#34;./app.py&#34; ]&#xA;STEP 9/11: COPY labels.json /usr/share/buildinfo/labels.json&#xA;STEP 10/11: COPY labels.json /root/buildinfo/labels.json&#xA;STEP 11/11: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;d981b3febb34efc636b69c342ae5be53aa224b90&#34; &#34;org.opencontainers.image.revision&#34;=&#34;d981b3febb34efc636b69c342ae5be53aa224b90&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#34; &#34;quay.expires-after&#34;=&#34;6h&#34; &#34;build-date&#34;=&#34;2026-04-19T13:53:38Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-04-19T13:53:38Z&#34;&#xA;COMMIT quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#xA;--&gt; de628cc63a6d&#xA;Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#xA;de628cc63a6da9621c04175d522ccbb0d1cccefe2164aa349706ea5ceb7517be&#xA;[2026-04-19T13:54:06,221453276+00:00] Unsetting proxy&#xA;[2026-04-19T13:54:06,222868612+00:00] Add metadata&#xA;Recording base image digests used&#xA;quay.io/devfile/python:slim quay.io/devfile/python:slim@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c&#xA;Getting image source signatures&#xA;Copying blob sha256:cac3a446bb1e2efd42dc84569853dd5b3bc43946f9cc2fe148ace90cb2b0d446&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying config sha256:de628cc63a6da9621c04175d522ccbb0d1cccefe2164aa349706ea5ceb7517be&#xA;Writing manifest to image destination&#xA;[2026-04-19T13:54:10,503236715+00:00] End build&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-build-container-pod | container step-push: &#xA;[2026-04-19T13:54:10,943362386+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-04-19T13:54:13,044981767+00:00] Convert image&#xA;[2026-04-19T13:54:13,046236093+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:test-comp-yssu-on-pull-request-tfdwd-build-container&#xA;[retry] executing: buildah push --format=oci --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90 docker://quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:test-comp-yssu-on-pull-request-tfdwd-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:cac3a446bb1e2efd42dc84569853dd5b3bc43946f9cc2fe148ace90cb2b0d446&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying config sha256:de628cc63a6da9621c04175d522ccbb0d1cccefe2164aa349706ea5ceb7517be&#xA;Writing manifest to image destination&#xA;[2026-04-19T13:54:15,922534985+00:00] Push image with git revision&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#xA;[retry] executing: buildah push --format=oci --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90 docker://quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#xA;Getting image source signatures&#xA;Copying blob sha256:cac3a446bb1e2efd42dc84569853dd5b3bc43946f9cc2fe148ace90cb2b0d446&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying config sha256:de628cc63a6da9621c04175d522ccbb0d1cccefe2164aa349706ea5ceb7517be&#xA;Writing manifest to image destination&#xA;sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#xA;[retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;[2026-04-19T13:54:16,879572701+00:00] End push&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-build-container-pod | container step-sbom-syft-generate: &#xA;[2026-04-19T13:54:17,040541746+00:00] Generate SBOM&#xA;Running syft on the image&#xA;Running syft on the source code&#xA;[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;[2026-04-19T13:54:26,002706967+00:00] End sbom-syft-generate&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-build-container-pod | container step-prepare-sboms: &#xA;[2026-04-19T13:54:26,154821125+00:00] Prepare SBOM&#xA;[2026-04-19T13:54:26,158906313+00:00] Generate SBOM with mobster&#xA;Skipping SBOM validation&#xA;2026-04-19 13:54:27,250 [INFO] mobster.log: Logging level set to 20&#xA;2026-04-19 13:54:27,329 [INFO] mobster.oci: Fetching manifest for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c&#xA;2026-04-19 13:54:27,839 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-04-19 13:54:28,013 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-04-19 13:54:28,403 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-04-19 13:54:28,602 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-04-19 13:54:29,010 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-04-19 13:54:29,198 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-04-19 13:54:29,630 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-04-19 13:54:29,814 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-04-19 13:54:29,814 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;2026-04-19 13:54:29,814 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;2026-04-19 13:54:29,815 [INFO] mobster.log: Contextual workflow completed in 2.50s&#xA;2026-04-19 13:54:29,837 [INFO] mobster.main: Exiting with code 0.&#xA;[2026-04-19T13:54:29,902529524+00:00] End prepare-sboms&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-build-container-pod | container step-upload-sbom: &#xA;[2026-04-19T13:54:30,240562731+00:00] Upload SBOM&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu&#xA;Pushing sbom to registry&#xA;[retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90@sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37&#xA;WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37] to [quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:sha256-707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37.sbom] with mediaType [text/spdx+json].&#xA;&#xA;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:9916ea163f9be66d4611d013e74845f5a579ab2148a1771cb1106f23293542bb&#xA;[2026-04-19T13:54:33,393002128+00:00] End upload-sbom&#xA;&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-build-image-index-pod | init container: prepare&#xA;2026/04/19 13:54:45 Entrypoint initialization&#xA;&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-build-image-index-pod | init container: place-scripts&#xA;2026/04/19 13:54:46 Decoded script /tekton/scripts/script-0-vz92m&#xA;2026/04/19 13:54:46 Decoded script /tekton/scripts/script-1-7rs7m&#xA;2026/04/19 13:54:46 Decoded script /tekton/scripts/script-2-9h69p&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-build-image-index-pod | container step-build: &#xA;[2026-04-19T13:54:50,014509749+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Running konflux-build-cli&#xA;time=&#34;2026-04-19T13:54:52Z&#34; level=info msg=&#34;[param] image: quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#34;&#xA;time=&#34;2026-04-19T13:54:52Z&#34; level=info msg=&#34;[param] images: [quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90@sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37]&#34;&#xA;time=&#34;2026-04-19T13:54:52Z&#34; level=info msg=&#34;[param] buildah-format: oci&#34;&#xA;time=&#34;2026-04-19T13:54:52Z&#34; level=info msg=&#34;[param] always-build-index: false&#34;&#xA;time=&#34;2026-04-19T13:54:52Z&#34; level=info msg=&#34;[param] additional-tags: [test-comp-yssu-on-pull-request-tfdwd-build-image-index]&#34;&#xA;time=&#34;2026-04-19T13:54:52Z&#34; level=info msg=&#34;[param] output-manifest-path: /index-build-data/manifest_data.json&#34;&#xA;time=&#34;2026-04-19T13:54:52Z&#34; level=info msg=&#34;[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST&#34;&#xA;time=&#34;2026-04-19T13:54:52Z&#34; level=info msg=&#34;[param] result-path-image-url: /tekton/results/IMAGE_URL&#34;&#xA;time=&#34;2026-04-19T13:54:52Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-04-19T13:54:52Z&#34; level=info msg=&#34;[param] result-path-images: /tekton/results/IMAGES&#34;&#xA;time=&#34;2026-04-19T13:54:52Z&#34; level=info msg=&#34;Creating manifest list: quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#34;&#xA;time=&#34;2026-04-19T13:54:52Z&#34; level=info msg=&#34;buildah [stdout] 64247682b04d2ae252de3dbb0f0feb1ac278480789d23a8575ebe9a76424db59&#34; logger=CliExecutor&#xA;time=&#34;2026-04-19T13:54:52Z&#34; level=info msg=&#34;Skipping image index generation. Returning results for single image.&#34;&#xA;{&#34;image_digest&#34;:&#34;sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37&#34;,&#34;image_url&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#34;,&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37&#34;,&#34;images&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37&#34;}&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-build-image-index-pod | container step-create-sbom: &#xA;The manifest_data.json file does not exist. Skipping the SBOM creation...&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-build-image-index-pod | container step-upload-sbom: &#xA;[2026-04-19T13:54:53,140711419+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;The index.spdx.json file does not exists. Skipping the SBOM upload...&#xA;&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-clair-scan-pod | init container: prepare&#xA;2026/04/19 13:56:59 Entrypoint initialization&#xA;&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-clair-scan-pod | init container: place-scripts&#xA;2026/04/19 13:57:00 Decoded script /tekton/scripts/script-0-sfmps&#xA;2026/04/19 13:57:00 Decoded script /tekton/scripts/script-1-dpss8&#xA;2026/04/19 13:57:00 Decoded script /tekton/scripts/script-2-j2nqr&#xA;2026/04/19 13:57:00 Decoded script /tekton/scripts/script-3-7xrm4&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-clair-scan-pod | container step-get-image-manifests: &#xA;Inspecting raw image manifest quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37.&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-clair-scan-pod | container step-get-vulnerabilities: &#xA;Running clair-action on amd64 image manifest...&#xA;�[90m2026-04-19T13:59:53Z�[0m �[32mINF�[0m �[1mmatchers created�[0m �[36mcomponent=�[0mlibvuln/New �[36mmatchers=�[0m[{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel&#34;,&#34;name&#34;:&#34;rhel&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel/rhcc&#34;,&#34;name&#34;:&#34;rhel-container-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/aws&#34;,&#34;name&#34;:&#34;aws-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/gobin&#34;,&#34;name&#34;:&#34;gobin&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/python&#34;,&#34;name&#34;:&#34;python&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ruby&#34;,&#34;name&#34;:&#34;ruby-gem&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/suse&#34;,&#34;name&#34;:&#34;suse&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/alpine&#34;,&#34;name&#34;:&#34;alpine-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/oracle&#34;,&#34;name&#34;:&#34;oracle&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ubuntu&#34;,&#34;name&#34;:&#34;ubuntu-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/debian&#34;,&#34;name&#34;:&#34;debian-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/java&#34;,&#34;name&#34;:&#34;java-maven&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/photon&#34;,&#34;name&#34;:&#34;photon&#34;}]&#xA;�[90m2026-04-19T13:59:53Z�[0m �[32mINF�[0m �[1mlibvuln initialized�[0m �[36mcomponent=�[0mlibvuln/New&#xA;�[90m2026-04-19T13:59:54Z�[0m �[32mINF�[0m �[1mregistered configured scanners�[0m �[36mcomponent=�[0mlibindex/New&#xA;�[90m2026-04-19T13:59:54Z�[0m �[32mINF�[0m �[1mNewLayerScanner: constructing a new layer-scanner�[0m �[36mcomponent=�[0mindexer.NewLayerScanner&#xA;�[90m2026-04-19T13:59:54Z�[0m �[32mINF�[0m �[1mindex request start�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37&#xA;�[90m2026-04-19T13:59:54Z�[0m �[32mINF�[0m �[1mstarting scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37&#xA;�[90m2026-04-19T13:59:54Z�[0m �[32mINF�[0m �[1mmanifest to be scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37 �[36mstate=�[0mCheckManifest&#xA;�[90m2026-04-19T13:59:54Z�[0m �[32mINF�[0m �[1mlayers fetch start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-19T13:59:55Z�[0m �[32mINF�[0m �[1mlayers fetch success�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-19T13:59:55Z�[0m �[32mINF�[0m �[1mlayers fetch done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-19T13:59:55Z�[0m �[32mINF�[0m �[1mlayers scan start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37 �[36mstate=�[0mScanLayers&#xA;�[90m2026-04-19T13:59:55Z�[0m �[32mINF�[0m �[1mlayers scan done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37 �[36mstate=�[0mScanLayers&#xA;�[90m2026-04-19T13:59:55Z�[0m �[32mINF�[0m �[1mstarting index manifest�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37 �[36mstate=�[0mIndexManifest&#xA;�[90m2026-04-19T13:59:55Z�[0m �[32mINF�[0m �[1mfinishing scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37 �[36mstate=�[0mIndexFinished&#xA;�[90m2026-04-19T13:59:55Z�[0m �[32mINF�[0m �[1mmanifest successfully scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37 �[36mstate=�[0mIndexFinished&#xA;�[90m2026-04-19T13:59:55Z�[0m �[32mINF�[0m �[1mindex request done�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37&#xA;{&#xA;  &#34;manifest_hash&#34;: &#34;sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37&#34;,&#xA;  &#34;packages&#34;: {&#xA;    &#34;+GDQTbek1zYvATiVR/wBCA==&#34;: {&#xA;      &#34;id&#34;: &#34;+GDQTbek1zYvATiVR/wBCA==&#34;,&#xA;      &#34;name&#34;: &#34;gzip&#34;,&#xA;      &#34;version&#34;: &#34;1.10-4+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gzip&#34;,&#xA;        &#34;version&#34;: &#34;1.10-4+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+aaqENN9U+Kuxcb1tQ8Utg==&#34;: {&#xA;      &#34;id&#34;: &#34;+aaqENN9U+Kuxcb1tQ8Utg==&#34;,&#xA;      &#34;name&#34;: &#34;netbase&#34;,&#xA;      &#34;version&#34;: &#34;6.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;netbase&#34;,&#xA;        &#34;version&#34;: &#34;6.3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+ol9cHiNc+RWiD7Kw3TLCg==&#34;: {&#xA;      &#34;id&#34;: &#34;+ol9cHiNc+RWiD7Kw3TLCg==&#34;,&#xA;      &#34;name&#34;: &#34;libcom-err2&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;05vApGRmP6ko1S0ji87IIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;05vApGRmP6ko1S0ji87IIQ==&#34;,&#xA;      &#34;name&#34;: &#34;libunistring2&#34;,&#xA;      &#34;version&#34;: &#34;0.9.10-4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libunistring&#34;,&#xA;        &#34;version&#34;: &#34;0.9.10-4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0jMyX7UCIuSpntMN1r7Ofg==&#34;: {&#xA;      &#34;id&#34;: &#34;0jMyX7UCIuSpntMN1r7Ofg==&#34;,&#xA;      &#34;name&#34;: &#34;libzstd1&#34;,&#xA;      &#34;version&#34;: &#34;1.4.8+dfsg-2.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libzstd&#34;,&#xA;        &#34;version&#34;: &#34;1.4.8+dfsg-2.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1jyJPCL93kiEbfmNKeyz3g==&#34;: {&#xA;      &#34;id&#34;: &#34;1jyJPCL93kiEbfmNKeyz3g==&#34;,&#xA;      &#34;name&#34;: &#34;jinja2&#34;,&#xA;      &#34;version&#34;: &#34;3.1.6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.3.1.6.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2MObxiEVNllmUEzdVZM5qw==&#34;: {&#xA;      &#34;id&#34;: &#34;2MObxiEVNllmUEzdVZM5qw==&#34;,&#xA;      &#34;name&#34;: &#34;apt&#34;,&#xA;      &#34;version&#34;: &#34;2.2.4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;apt&#34;,&#xA;        &#34;version&#34;: &#34;2.2.4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3f992oeEQfSQxRA0nlq8Wg==&#34;: {&#xA;      &#34;id&#34;: &#34;3f992oeEQfSQxRA0nlq8Wg==&#34;,&#xA;      &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;      &#34;version&#34;: &#34;1.8.7-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;1.8.7-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4672uZtn8TnHDEzWVyhfjw==&#34;: {&#xA;      &#34;id&#34;: &#34;4672uZtn8TnHDEzWVyhfjw==&#34;,&#xA;      &#34;name&#34;: &#34;base-files&#34;,&#xA;      &#34;version&#34;: &#34;11.1+deb11u5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;base-files&#34;,&#xA;        &#34;version&#34;: &#34;11.1+deb11u5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4jCPzhS6OWt4agz9d/cfTw==&#34;: {&#xA;      &#34;id&#34;: &#34;4jCPzhS6OWt4agz9d/cfTw==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-base&#34;,&#xA;      &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5zxxTA220k9gPCegfDHkag==&#34;: {&#xA;      &#34;id&#34;: &#34;5zxxTA220k9gPCegfDHkag==&#34;,&#xA;      &#34;name&#34;: &#34;libgmp10&#34;,&#xA;      &#34;version&#34;: &#34;2:6.2.1+dfsg-1+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gmp&#34;,&#xA;        &#34;version&#34;: &#34;2:6.2.1+dfsg-1+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7a3yla6TRFZrhmAreU7f8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;7a3yla6TRFZrhmAreU7f8Q==&#34;,&#xA;      &#34;name&#34;: &#34;libexpat1&#34;,&#xA;      &#34;version&#34;: &#34;2.2.10-2+deb11u5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;2.2.10-2+deb11u5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8alfBYUr5uWbAyB5PrY8Hg==&#34;: {&#xA;      &#34;id&#34;: &#34;8alfBYUr5uWbAyB5PrY8Hg==&#34;,&#xA;      &#34;name&#34;: &#34;libudev1&#34;,&#xA;      &#34;version&#34;: &#34;247.3-7+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;247.3-7+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9snKXrH4dQy2IXHQ01Lg0A==&#34;: {&#xA;      &#34;id&#34;: &#34;9snKXrH4dQy2IXHQ01Lg0A==&#34;,&#xA;      &#34;name&#34;: &#34;libaudit1&#34;,&#xA;      &#34;version&#34;: &#34;1:3.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;audit&#34;,&#xA;        &#34;version&#34;: &#34;1:3.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Akbft1KN+9FKNhh1tM25eA==&#34;: {&#xA;      &#34;id&#34;: &#34;Akbft1KN+9FKNhh1tM25eA==&#34;,&#xA;      &#34;name&#34;: &#34;mount&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BJL42acLPAR8bEnmM1Z3mg==&#34;: {&#xA;      &#34;id&#34;: &#34;BJL42acLPAR8bEnmM1Z3mg==&#34;,&#xA;      &#34;name&#34;: &#34;libblkid1&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CBzoMmlXBcyP54HOnauO0g==&#34;: {&#xA;      &#34;id&#34;: &#34;CBzoMmlXBcyP54HOnauO0g==&#34;,&#xA;      &#34;name&#34;: &#34;libpam-runtime&#34;,&#xA;      &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CpILSbg3p6D7Gsp8sCW1Rg==&#34;: {&#xA;      &#34;id&#34;: &#34;CpILSbg3p6D7Gsp8sCW1Rg==&#34;,&#xA;      &#34;name&#34;: &#34;libsemanage1&#34;,&#xA;      &#34;version&#34;: &#34;3.1-1+b2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsemanage&#34;,&#xA;        &#34;version&#34;: &#34;3.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;D0G6c/ML9XX4eoGHgx1jeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;D0G6c/ML9XX4eoGHgx1jeQ==&#34;,&#xA;      &#34;name&#34;: &#34;libc6&#34;,&#xA;      &#34;version&#34;: &#34;2.31-13+deb11u5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.31-13+deb11u5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DY5Co0gkGtbgwDlkjfJLWA==&#34;: {&#xA;      &#34;id&#34;: &#34;DY5Co0gkGtbgwDlkjfJLWA==&#34;,&#xA;      &#34;name&#34;: &#34;markupsafe&#34;,&#xA;      &#34;version&#34;: &#34;3.0.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.3.0.3.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DtMxcnDA8Je9vAHjmzagaA==&#34;: {&#xA;      &#34;id&#34;: &#34;DtMxcnDA8Je9vAHjmzagaA==&#34;,&#xA;      &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EVGnnBfWyiVHhoIR4vEpgg==&#34;: {&#xA;      &#34;id&#34;: &#34;EVGnnBfWyiVHhoIR4vEpgg==&#34;,&#xA;      &#34;name&#34;: &#34;libbz2-1.0&#34;,&#xA;      &#34;version&#34;: &#34;1.0.8-4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bzip2&#34;,&#xA;        &#34;version&#34;: &#34;1.0.8-4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ExYxXcgoIRjAjUObwDE4jA==&#34;: {&#xA;      &#34;id&#34;: &#34;ExYxXcgoIRjAjUObwDE4jA==&#34;,&#xA;      &#34;name&#34;: &#34;libk5crypto3&#34;,&#xA;      &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FJIijlwFNqvdoVBcfTF/pg==&#34;: {&#xA;      &#34;id&#34;: &#34;FJIijlwFNqvdoVBcfTF/pg==&#34;,&#xA;      &#34;name&#34;: &#34;login&#34;,&#xA;      &#34;version&#34;: &#34;1:4.8.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;1:4.8.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FOAAB3KiNsLyi03hQsjRTA==&#34;: {&#xA;      &#34;id&#34;: &#34;FOAAB3KiNsLyi03hQsjRTA==&#34;,&#xA;      &#34;name&#34;: &#34;libcrypt1&#34;,&#xA;      &#34;version&#34;: &#34;1:4.4.18-4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;        &#34;version&#34;: &#34;1:4.4.18-4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FrUy4mOCaHm5aGT53as3JQ==&#34;: {&#xA;      &#34;id&#34;: &#34;FrUy4mOCaHm5aGT53as3JQ==&#34;,&#xA;      &#34;name&#34;: &#34;diffutils&#34;,&#xA;      &#34;version&#34;: &#34;1:3.7-5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;diffutils&#34;,&#xA;        &#34;version&#34;: &#34;1:3.7-5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;G/7q+D+DsqYAVnohcyuzgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;G/7q+D+DsqYAVnohcyuzgQ==&#34;,&#xA;      &#34;name&#34;: &#34;libssl1.1&#34;,&#xA;      &#34;version&#34;: &#34;1.1.1n-0+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;1.1.1n-0+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GGaavnLgXX31qx9chfhdOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GGaavnLgXX31qx9chfhdOQ==&#34;,&#xA;      &#34;name&#34;: &#34;libaudit-common&#34;,&#xA;      &#34;version&#34;: &#34;1:3.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;audit&#34;,&#xA;        &#34;version&#34;: &#34;1:3.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Gm6VA87iOnaQ0rWR6oO9eA==&#34;: {&#xA;      &#34;id&#34;: &#34;Gm6VA87iOnaQ0rWR6oO9eA==&#34;,&#xA;      &#34;name&#34;: &#34;libpcre2-8-0&#34;,&#xA;      &#34;version&#34;: &#34;10.36-2+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;10.36-2+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HFwGHerHwgvY8vkjr3x1Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;HFwGHerHwgvY8vkjr3x1Pg==&#34;,&#xA;      &#34;name&#34;: &#34;itsdangerous&#34;,&#xA;      &#34;version&#34;: &#34;2.2.0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.2.2.0.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IQfQp74RcAWE7jHtQsMLHg==&#34;: {&#xA;      &#34;id&#34;: &#34;IQfQp74RcAWE7jHtQsMLHg==&#34;,&#xA;      &#34;name&#34;: &#34;bsdutils&#34;,&#xA;      &#34;version&#34;: &#34;1:2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IiJKm8T4olfm6rhuKayFOw==&#34;: {&#xA;      &#34;id&#34;: &#34;IiJKm8T4olfm6rhuKayFOw==&#34;,&#xA;      &#34;name&#34;: &#34;lsb-base&#34;,&#xA;      &#34;version&#34;: &#34;11.1.0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lsb&#34;,&#xA;        &#34;version&#34;: &#34;11.1.0&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Jg2vDvx1JxyPDIrUzzR9NQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Jg2vDvx1JxyPDIrUzzR9NQ==&#34;,&#xA;      &#34;name&#34;: &#34;grep&#34;,&#xA;      &#34;version&#34;: &#34;3.6-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;grep&#34;,&#xA;        &#34;version&#34;: &#34;3.6-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LOfpAnA/2f7zE4SFJCrxVg==&#34;: {&#xA;      &#34;id&#34;: &#34;LOfpAnA/2f7zE4SFJCrxVg==&#34;,&#xA;      &#34;name&#34;: &#34;zlib1g&#34;,&#xA;      &#34;version&#34;: &#34;1:1.2.11.dfsg-2+deb11u2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;1:1.2.11.dfsg-2+deb11u2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LVHVhWoZgWwWvOspyUwb1w==&#34;: {&#xA;      &#34;id&#34;: &#34;LVHVhWoZgWwWvOspyUwb1w==&#34;,&#xA;      &#34;name&#34;: &#34;libreadline8&#34;,&#xA;      &#34;version&#34;: &#34;8.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;readline&#34;,&#xA;        &#34;version&#34;: &#34;8.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MvKvHHnD0jaLaWpyHvkhgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;MvKvHHnD0jaLaWpyHvkhgQ==&#34;,&#xA;      &#34;name&#34;: &#34;passwd&#34;,&#xA;      &#34;version&#34;: &#34;1:4.8.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;1:4.8.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NA4G2YrIZ73fsX7d5r5rGw==&#34;: {&#xA;      &#34;id&#34;: &#34;NA4G2YrIZ73fsX7d5r5rGw==&#34;,&#xA;      &#34;name&#34;: &#34;debconf&#34;,&#xA;      &#34;version&#34;: &#34;1.5.77&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;debconf&#34;,&#xA;        &#34;version&#34;: &#34;1.5.77&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NzkVb7F31E+Vxxz3PCS6tg==&#34;: {&#xA;      &#34;id&#34;: &#34;NzkVb7F31E+Vxxz3PCS6tg==&#34;,&#xA;      &#34;name&#34;: &#34;libkrb5support0&#34;,&#xA;      &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OgJFdUXRfF1Ls8u1+eOivw==&#34;: {&#xA;      &#34;id&#34;: &#34;OgJFdUXRfF1Ls8u1+eOivw==&#34;,&#xA;      &#34;name&#34;: &#34;libgpg-error0&#34;,&#xA;      &#34;version&#34;: &#34;1.38-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;        &#34;version&#34;: &#34;1.38-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;PaaRbD/FkW3JARtSKQgRcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;PaaRbD/FkW3JARtSKQgRcQ==&#34;,&#xA;      &#34;name&#34;: &#34;libattr1&#34;,&#xA;      &#34;version&#34;: &#34;1:2.4.48-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;attr&#34;,&#xA;        &#34;version&#34;: &#34;1:2.4.48-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;PgPY5hWnihXRN45byvzY0g==&#34;: {&#xA;      &#34;id&#34;: &#34;PgPY5hWnihXRN45byvzY0g==&#34;,&#xA;      &#34;name&#34;: &#34;libncursesw6&#34;,&#xA;      &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;R1TkRM71ql+JWgz0VF5ESQ==&#34;: {&#xA;      &#34;id&#34;: &#34;R1TkRM71ql+JWgz0VF5ESQ==&#34;,&#xA;      &#34;name&#34;: &#34;libsepol1&#34;,&#xA;      &#34;version&#34;: &#34;3.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;3.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RAMuXEdVU4AJ/z4aiK/NNg==&#34;: {&#xA;      &#34;id&#34;: &#34;RAMuXEdVU4AJ/z4aiK/NNg==&#34;,&#xA;      &#34;name&#34;: &#34;setuptools&#34;,&#xA;      &#34;version&#34;: &#34;65.5.0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.65.5.0.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RYsqO4ROpGMzzCO5WaTrlw==&#34;: {&#xA;      &#34;id&#34;: &#34;RYsqO4ROpGMzzCO5WaTrlw==&#34;,&#xA;      &#34;name&#34;: &#34;dpkg&#34;,&#xA;      &#34;version&#34;: &#34;1.20.12&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dpkg&#34;,&#xA;        &#34;version&#34;: &#34;1.20.12&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RgdwX+VC70nXZ2E527PXaA==&#34;: {&#xA;      &#34;id&#34;: &#34;RgdwX+VC70nXZ2E527PXaA==&#34;,&#xA;      &#34;name&#34;: &#34;logsave&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SWnjL4fWu+WMpxhSCWLhZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;SWnjL4fWu+WMpxhSCWLhZQ==&#34;,&#xA;      &#34;name&#34;: &#34;base-passwd&#34;,&#xA;      &#34;version&#34;: &#34;3.5.51&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;base-passwd&#34;,&#xA;        &#34;version&#34;: &#34;3.5.51&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;T5NuX1yinNyGoZNN2r9u4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;T5NuX1yinNyGoZNN2r9u4Q==&#34;,&#xA;      &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;      &#34;version&#34;: &#34;20210119&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;        &#34;version&#34;: &#34;20210119&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VVXsYlCxogg17Ti1iR03Mw==&#34;: {&#xA;      &#34;id&#34;: &#34;VVXsYlCxogg17Ti1iR03Mw==&#34;,&#xA;      &#34;name&#34;: &#34;libseccomp2&#34;,&#xA;      &#34;version&#34;: &#34;2.5.1-1+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libseccomp&#34;,&#xA;        &#34;version&#34;: &#34;2.5.1-1+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VbNyM3GfR5vEmJdFAiKqrA==&#34;: {&#xA;      &#34;id&#34;: &#34;VbNyM3GfR5vEmJdFAiKqrA==&#34;,&#xA;      &#34;name&#34;: &#34;gcc-9-base&#34;,&#xA;      &#34;version&#34;: &#34;9.3.0-22&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-9&#34;,&#xA;        &#34;version&#34;: &#34;9.3.0-22&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Wi4oa03apqVdR6okNeZiNA==&#34;: {&#xA;      &#34;id&#34;: &#34;Wi4oa03apqVdR6okNeZiNA==&#34;,&#xA;      &#34;name&#34;: &#34;libgnutls30&#34;,&#xA;      &#34;version&#34;: &#34;3.7.1-5+deb11u2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;3.7.1-5+deb11u2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZPlAztePXX+uFLVDX2lgNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ZPlAztePXX+uFLVDX2lgNQ==&#34;,&#xA;      &#34;name&#34;: &#34;libsemanage-common&#34;,&#xA;      &#34;version&#34;: &#34;3.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsemanage&#34;,&#xA;        &#34;version&#34;: &#34;3.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZWeYh81MRCu1nh3mOyptIA==&#34;: {&#xA;      &#34;id&#34;: &#34;ZWeYh81MRCu1nh3mOyptIA==&#34;,&#xA;      &#34;name&#34;: &#34;libmount1&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bGWj1aSf0wvrecU/pdTv5A==&#34;: {&#xA;      &#34;id&#34;: &#34;bGWj1aSf0wvrecU/pdTv5A==&#34;,&#xA;      &#34;name&#34;: &#34;gcc-10-base&#34;,&#xA;      &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-10&#34;,&#xA;        &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bHkSxcl6e1quNxLGb6uX8A==&#34;: {&#xA;      &#34;id&#34;: &#34;bHkSxcl6e1quNxLGb6uX8A==&#34;,&#xA;      &#34;name&#34;: &#34;coreutils&#34;,&#xA;      &#34;version&#34;: &#34;8.32-4+b1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;8.32-4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bTSLWiizipO2axtmvXFuVg==&#34;: {&#xA;      &#34;id&#34;: &#34;bTSLWiizipO2axtmvXFuVg==&#34;,&#xA;      &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;      &#34;version&#34;: &#34;4.16.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;        &#34;version&#34;: &#34;4.16.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;be3s5y0dx4bgsQboIoDduw==&#34;: {&#xA;      &#34;id&#34;: &#34;be3s5y0dx4bgsQboIoDduw==&#34;,&#xA;      &#34;name&#34;: &#34;libp11-kit0&#34;,&#xA;      &#34;version&#34;: &#34;0.23.22-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;p11-kit&#34;,&#xA;        &#34;version&#34;: &#34;0.23.22-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;brvvAQ6V7yp7QbUuk+W5Hg==&#34;: {&#xA;      &#34;id&#34;: &#34;brvvAQ6V7yp7QbUuk+W5Hg==&#34;,&#xA;      &#34;name&#34;: &#34;libext2fs2&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;d4b/e0nx+/vPWuPB7oDzPw==&#34;: {&#xA;      &#34;id&#34;: &#34;d4b/e0nx+/vPWuPB7oDzPw==&#34;,&#xA;      &#34;name&#34;: &#34;libc-bin&#34;,&#xA;      &#34;version&#34;: &#34;2.31-13+deb11u5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.31-13+deb11u5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dRfu6Up2F2Ze+gJ21oSeug==&#34;: {&#xA;      &#34;id&#34;: &#34;dRfu6Up2F2Ze+gJ21oSeug==&#34;,&#xA;      &#34;name&#34;: &#34;libgdbm6&#34;,&#xA;      &#34;version&#34;: &#34;1.19-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdbm&#34;,&#xA;        &#34;version&#34;: &#34;1.19-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dUT53gagQO5Ac9Bdlu5dAw==&#34;: {&#xA;      &#34;id&#34;: &#34;dUT53gagQO5Ac9Bdlu5dAw==&#34;,&#xA;      &#34;name&#34;: &#34;sysvinit-utils&#34;,&#xA;      &#34;version&#34;: &#34;2.96-7+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sysvinit&#34;,&#xA;        &#34;version&#34;: &#34;2.96-7+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dXglURzzdbLnOf14mab1Hg==&#34;: {&#xA;      &#34;id&#34;: &#34;dXglURzzdbLnOf14mab1Hg==&#34;,&#xA;      &#34;name&#34;: &#34;tar&#34;,&#xA;      &#34;version&#34;: &#34;1.34+dfsg-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;1.34+dfsg-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dobmrwm7aq9puvFHwNgXxw==&#34;: {&#xA;      &#34;id&#34;: &#34;dobmrwm7aq9puvFHwNgXxw==&#34;,&#xA;      &#34;name&#34;: &#34;libstdc++6&#34;,&#xA;      &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-10&#34;,&#xA;        &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dv3AlW8tBL4D0mEPW7/Z2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;dv3AlW8tBL4D0mEPW7/Z2Q==&#34;,&#xA;      &#34;name&#34;: &#34;libpam-modules-bin&#34;,&#xA;      &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eF2QIdrTmJlWmjQTkhntow==&#34;: {&#xA;      &#34;id&#34;: &#34;eF2QIdrTmJlWmjQTkhntow==&#34;,&#xA;      &#34;name&#34;: &#34;wheel&#34;,&#xA;      &#34;version&#34;: &#34;0.38.4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.0.38.4.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;elSR7m8uLWd/kMl2jxTm/A==&#34;: {&#xA;      &#34;id&#34;: &#34;elSR7m8uLWd/kMl2jxTm/A==&#34;,&#xA;      &#34;name&#34;: &#34;libpam-modules&#34;,&#xA;      &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;evNF5YpSAxyFV7iWv3lSVw==&#34;: {&#xA;      &#34;id&#34;: &#34;evNF5YpSAxyFV7iWv3lSVw==&#34;,&#xA;      &#34;name&#34;: &#34;openssl&#34;,&#xA;      &#34;version&#34;: &#34;1.1.1n-0+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;1.1.1n-0+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fCmdLCR2Ix0ldnZL1Fa52A==&#34;: {&#xA;      &#34;id&#34;: &#34;fCmdLCR2Ix0ldnZL1Fa52A==&#34;,&#xA;      &#34;name&#34;: &#34;bash&#34;,&#xA;      &#34;version&#34;: &#34;5.1-2+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bash&#34;,&#xA;        &#34;version&#34;: &#34;5.1-2+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fqwKjkzVNvsxh6040zt05g==&#34;: {&#xA;      &#34;id&#34;: &#34;fqwKjkzVNvsxh6040zt05g==&#34;,&#xA;      &#34;name&#34;: &#34;hostname&#34;,&#xA;      &#34;version&#34;: &#34;3.23&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;hostname&#34;,&#xA;        &#34;version&#34;: &#34;3.23&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fyM9Y65kt8cTfJv4LKF7bg==&#34;: {&#xA;      &#34;id&#34;: &#34;fyM9Y65kt8cTfJv4LKF7bg==&#34;,&#xA;      &#34;name&#34;: &#34;libcap-ng0&#34;,&#xA;      &#34;version&#34;: &#34;0.7.9-2.2+b1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;        &#34;version&#34;: &#34;0.7.9-2.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gP9HgvZWct50Kw/hM7BCKg==&#34;: {&#xA;      &#34;id&#34;: &#34;gP9HgvZWct50Kw/hM7BCKg==&#34;,&#xA;      &#34;name&#34;: &#34;libtirpc-common&#34;,&#xA;      &#34;version&#34;: &#34;1.3.1-1+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtirpc&#34;,&#xA;        &#34;version&#34;: &#34;1.3.1-1+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gv6x84VyNacZgvJrC59jbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;gv6x84VyNacZgvJrC59jbQ==&#34;,&#xA;      &#34;name&#34;: &#34;libffi7&#34;,&#xA;      &#34;version&#34;: &#34;3.3-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libffi&#34;,&#xA;        &#34;version&#34;: &#34;3.3-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hdNUjYIlrdEAtBWAggakAw==&#34;: {&#xA;      &#34;id&#34;: &#34;hdNUjYIlrdEAtBWAggakAw==&#34;,&#xA;      &#34;name&#34;: &#34;perl-base&#34;,&#xA;      &#34;version&#34;: &#34;5.32.1-4+deb11u2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;5.32.1-4+deb11u2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;i4JkQ9JgSpZVyPFWOY5Bxw==&#34;: {&#xA;      &#34;id&#34;: &#34;i4JkQ9JgSpZVyPFWOY5Bxw==&#34;,&#xA;      &#34;name&#34;: &#34;liblz4-1&#34;,&#xA;      &#34;version&#34;: &#34;1.9.3-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lz4&#34;,&#xA;        &#34;version&#34;: &#34;1.9.3-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iWqdRZmp08/Tx22qEtmjJg==&#34;: {&#xA;      &#34;id&#34;: &#34;iWqdRZmp08/Tx22qEtmjJg==&#34;,&#xA;      &#34;name&#34;: &#34;libpcre3&#34;,&#xA;      &#34;version&#34;: &#34;2:8.39-13&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;2:8.39-13&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jErhz6PtXvAy/EPWJ425rA==&#34;: {&#xA;      &#34;id&#34;: &#34;jErhz6PtXvAy/EPWJ425rA==&#34;,&#xA;      &#34;name&#34;: &#34;libuuid1&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jKa8Us2cqGejhOc2/n5DDA==&#34;: {&#xA;      &#34;id&#34;: &#34;jKa8Us2cqGejhOc2/n5DDA==&#34;,&#xA;      &#34;name&#34;: &#34;libsmartcols1&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kq4lGEwi4agkgAJAkDs9Ng==&#34;: {&#xA;      &#34;id&#34;: &#34;kq4lGEwi4agkgAJAkDs9Ng==&#34;,&#xA;      &#34;name&#34;: &#34;flask&#34;,&#xA;      &#34;version&#34;: &#34;2.1.0&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.2.1.0.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;krch6TQqNWzRi5F/dDkF+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;krch6TQqNWzRi5F/dDkF+Q==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-bin&#34;,&#xA;      &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;l5lCPjtOmPM8/LLh9+NjeQ==&#34;: {&#xA;      &#34;id&#34;: &#34;l5lCPjtOmPM8/LLh9+NjeQ==&#34;,&#xA;      &#34;name&#34;: &#34;gpgv&#34;,&#xA;      &#34;version&#34;: &#34;2.2.27-2+deb11u2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;2.2.27-2+deb11u2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;l89yAZ/vyULk4EoaRdbg9w==&#34;: {&#xA;      &#34;id&#34;: &#34;l89yAZ/vyULk4EoaRdbg9w==&#34;,&#xA;      &#34;name&#34;: &#34;click&#34;,&#xA;      &#34;version&#34;: &#34;8.3.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.8.3.2.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lCjIskl1HulEHShaXtgmwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lCjIskl1HulEHShaXtgmwQ==&#34;,&#xA;      &#34;name&#34;: &#34;libtinfo6&#34;,&#xA;      &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.2+20201114-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lvz5sq0NbU6sy/F1tg9uiQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lvz5sq0NbU6sy/F1tg9uiQ==&#34;,&#xA;      &#34;name&#34;: &#34;libkeyutils1&#34;,&#xA;      &#34;version&#34;: &#34;1.6.1-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;keyutils&#34;,&#xA;        &#34;version&#34;: &#34;1.6.1-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mlFDx1iAC2OWpmYHut2JHw==&#34;: {&#xA;      &#34;id&#34;: &#34;mlFDx1iAC2OWpmYHut2JHw==&#34;,&#xA;      &#34;name&#34;: &#34;libnettle8&#34;,&#xA;      &#34;version&#34;: &#34;3.7.3-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nettle&#34;,&#xA;        &#34;version&#34;: &#34;3.7.3-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nV87o429QBKIpM8DyOv4wg==&#34;: {&#xA;      &#34;id&#34;: &#34;nV87o429QBKIpM8DyOv4wg==&#34;,&#xA;      &#34;name&#34;: &#34;debian-archive-keyring&#34;,&#xA;      &#34;version&#34;: &#34;2021.1.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;debian-archive-keyring&#34;,&#xA;        &#34;version&#34;: &#34;2021.1.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ngOu/a+sfrdDkZtETF1mgg==&#34;: {&#xA;      &#34;id&#34;: &#34;ngOu/a+sfrdDkZtETF1mgg==&#34;,&#xA;      &#34;name&#34;: &#34;libselinux1&#34;,&#xA;      &#34;version&#34;: &#34;3.1-3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libselinux&#34;,&#xA;        &#34;version&#34;: &#34;3.1-3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nmd/xrCD27AKRWAzA5JZCA==&#34;: {&#xA;      &#34;id&#34;: &#34;nmd/xrCD27AKRWAzA5JZCA==&#34;,&#xA;      &#34;name&#34;: &#34;mawk&#34;,&#xA;      &#34;version&#34;: &#34;1.3.4.20200120-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;mawk&#34;,&#xA;        &#34;version&#34;: &#34;1.3.4.20200120-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;npX4tBmidkxp2QJN/c3Ktw==&#34;: {&#xA;      &#34;id&#34;: &#34;npX4tBmidkxp2QJN/c3Ktw==&#34;,&#xA;      &#34;name&#34;: &#34;libdebconfclient0&#34;,&#xA;      &#34;version&#34;: &#34;0.260&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cdebconf&#34;,&#xA;        &#34;version&#34;: &#34;0.260&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nwapLKtbHTjy1u8+aA0X+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;nwapLKtbHTjy1u8+aA0X+Q==&#34;,&#xA;      &#34;name&#34;: &#34;pip&#34;,&#xA;      &#34;version&#34;: &#34;22.3.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.22.3.1.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;oH9T0w9ZyXDCGJ6Np6n1Iw==&#34;: {&#xA;      &#34;id&#34;: &#34;oH9T0w9ZyXDCGJ6Np6n1Iw==&#34;,&#xA;      &#34;name&#34;: &#34;init-system-helpers&#34;,&#xA;      &#34;version&#34;: &#34;1.60&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;init-system-helpers&#34;,&#xA;        &#34;version&#34;: &#34;1.60&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ozJ983JkaV259+RUbqutzw==&#34;: {&#xA;      &#34;id&#34;: &#34;ozJ983JkaV259+RUbqutzw==&#34;,&#xA;      &#34;name&#34;: &#34;dash&#34;,&#xA;      &#34;version&#34;: &#34;0.5.11+git20200708+dd9ef66-5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dash&#34;,&#xA;        &#34;version&#34;: &#34;0.5.11+git20200708+dd9ef66-5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;p+J9YgA22NC8PDODpTSxgw==&#34;: {&#xA;      &#34;id&#34;: &#34;p+J9YgA22NC8PDODpTSxgw==&#34;,&#xA;      &#34;name&#34;: &#34;libidn2-0&#34;,&#xA;      &#34;version&#34;: &#34;2.3.0-5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libidn2&#34;,&#xA;        &#34;version&#34;: &#34;2.3.0-5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pHAWej2qVWZtoCQ5DGoRcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pHAWej2qVWZtoCQ5DGoRcQ==&#34;,&#xA;      &#34;name&#34;: &#34;tzdata&#34;,&#xA;      &#34;version&#34;: &#34;2021a-1+deb11u8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tzdata&#34;,&#xA;        &#34;version&#34;: &#34;2021a-1+deb11u8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pZoLgWqHDgjhYQPevrtwdg==&#34;: {&#xA;      &#34;id&#34;: &#34;pZoLgWqHDgjhYQPevrtwdg==&#34;,&#xA;      &#34;name&#34;: &#34;libss2&#34;,&#xA;      &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.46.2-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;q78XIEiJs5tQHLZtjoU3Fg==&#34;: {&#xA;      &#34;id&#34;: &#34;q78XIEiJs5tQHLZtjoU3Fg==&#34;,&#xA;      &#34;name&#34;: &#34;adduser&#34;,&#xA;      &#34;version&#34;: &#34;3.118&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;adduser&#34;,&#xA;        &#34;version&#34;: &#34;3.118&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qN2BSWBeEFRJnExMNJ1S0A==&#34;: {&#xA;      &#34;id&#34;: &#34;qN2BSWBeEFRJnExMNJ1S0A==&#34;,&#xA;      &#34;name&#34;: &#34;libsqlite3-0&#34;,&#xA;      &#34;version&#34;: &#34;3.34.1-3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;3.34.1-3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qrPZzwjmppjOiQbrGk5IQA==&#34;: {&#xA;      &#34;id&#34;: &#34;qrPZzwjmppjOiQbrGk5IQA==&#34;,&#xA;      &#34;name&#34;: &#34;libgssapi-krb5-2&#34;,&#xA;      &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rJ4UB7yOdBPwgrk5WLwIQw==&#34;: {&#xA;      &#34;id&#34;: &#34;rJ4UB7yOdBPwgrk5WLwIQw==&#34;,&#xA;      &#34;name&#34;: &#34;libhogweed6&#34;,&#xA;      &#34;version&#34;: &#34;3.7.3-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nettle&#34;,&#xA;        &#34;version&#34;: &#34;3.7.3-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rUyBCRoo9C2erJrGUkvuDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rUyBCRoo9C2erJrGUkvuDQ==&#34;,&#xA;      &#34;name&#34;: &#34;libtirpc3&#34;,&#xA;      &#34;version&#34;: &#34;1.3.1-1+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtirpc&#34;,&#xA;        &#34;version&#34;: &#34;1.3.1-1+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;s66OGd0F2Pbemhmyrg2R9w==&#34;: {&#xA;      &#34;id&#34;: &#34;s66OGd0F2Pbemhmyrg2R9w==&#34;,&#xA;      &#34;name&#34;: &#34;libsystemd0&#34;,&#xA;      &#34;version&#34;: &#34;247.3-7+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;247.3-7+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sU05gaIadSYQd4+DxTnInw==&#34;: {&#xA;      &#34;id&#34;: &#34;sU05gaIadSYQd4+DxTnInw==&#34;,&#xA;      &#34;name&#34;: &#34;libacl1&#34;,&#xA;      &#34;version&#34;: &#34;2.2.53-10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;acl&#34;,&#xA;        &#34;version&#34;: &#34;2.2.53-10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sXwy5mmgqLM9WC30BdKwTA==&#34;: {&#xA;      &#34;id&#34;: &#34;sXwy5mmgqLM9WC30BdKwTA==&#34;,&#xA;      &#34;name&#34;: &#34;readline-common&#34;,&#xA;      &#34;version&#34;: &#34;8.1-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;readline&#34;,&#xA;        &#34;version&#34;: &#34;8.1-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;all&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tNSJ6slY9zv+TZ6de2MVDQ==&#34;: {&#xA;      &#34;id&#34;: &#34;tNSJ6slY9zv+TZ6de2MVDQ==&#34;,&#xA;      &#34;name&#34;: &#34;liblzma5&#34;,&#xA;      &#34;version&#34;: &#34;5.2.5-2.1~deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz-utils&#34;,&#xA;        &#34;version&#34;: &#34;5.2.5-2.1~deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tYADP/V07/lE8Qno1R/hhg==&#34;: {&#xA;      &#34;id&#34;: &#34;tYADP/V07/lE8Qno1R/hhg==&#34;,&#xA;      &#34;name&#34;: &#34;libgcc-s1&#34;,&#xA;      &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-10&#34;,&#xA;        &#34;version&#34;: &#34;10.2.1-6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uRB+svwXXxpR9DkvUVmAUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;uRB+svwXXxpR9DkvUVmAUQ==&#34;,&#xA;      &#34;name&#34;: &#34;werkzeug&#34;,&#xA;      &#34;version&#34;: &#34;3.1.8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;pep440:0.3.1.8.0.0.0.0.0.0&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uXsuLx/plg6mDddGlE/9EA==&#34;: {&#xA;      &#34;id&#34;: &#34;uXsuLx/plg6mDddGlE/9EA==&#34;,&#xA;      &#34;name&#34;: &#34;libxxhash0&#34;,&#xA;      &#34;version&#34;: &#34;0.8.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xxhash&#34;,&#xA;        &#34;version&#34;: &#34;0.8.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vqKK+x/7cGHNjLr4L7x4uQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vqKK+x/7cGHNjLr4L7x4uQ==&#34;,&#xA;      &#34;name&#34;: &#34;libdb5.3&#34;,&#xA;      &#34;version&#34;: &#34;5.3.28+dfsg1-0.8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;db5.3&#34;,&#xA;        &#34;version&#34;: &#34;5.3.28+dfsg1-0.8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wkuBBC4B84P3b4K0fGF0OQ==&#34;: {&#xA;      &#34;id&#34;: &#34;wkuBBC4B84P3b4K0fGF0OQ==&#34;,&#xA;      &#34;name&#34;: &#34;util-linux&#34;,&#xA;      &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.36.1-8+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xaMEpa2lawXi7R9jqzX8hA==&#34;: {&#xA;      &#34;id&#34;: &#34;xaMEpa2lawXi7R9jqzX8hA==&#34;,&#xA;      &#34;name&#34;: &#34;findutils&#34;,&#xA;      &#34;version&#34;: &#34;4.8.0-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;findutils&#34;,&#xA;        &#34;version&#34;: &#34;4.8.0-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yYcMjCGhY/mc+KraTEHSJg==&#34;: {&#xA;      &#34;id&#34;: &#34;yYcMjCGhY/mc+KraTEHSJg==&#34;,&#xA;      &#34;name&#34;: &#34;libkrb5-3&#34;,&#xA;      &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.3-6+deb11u3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zL6jHnohFUDkhEaUeTlPOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zL6jHnohFUDkhEaUeTlPOQ==&#34;,&#xA;      &#34;name&#34;: &#34;sed&#34;,&#xA;      &#34;version&#34;: &#34;4.7-1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sed&#34;,&#xA;        &#34;version&#34;: &#34;4.7-1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zQ8wKwnOqSw7e/gsx76vLQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zQ8wKwnOqSw7e/gsx76vLQ==&#34;,&#xA;      &#34;name&#34;: &#34;debianutils&#34;,&#xA;      &#34;version&#34;: &#34;4.11.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;debianutils&#34;,&#xA;        &#34;version&#34;: &#34;4.11.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zRv/Q67g6qJWTz0qqj4+BA==&#34;: {&#xA;      &#34;id&#34;: &#34;zRv/Q67g6qJWTz0qqj4+BA==&#34;,&#xA;      &#34;name&#34;: &#34;libnsl2&#34;,&#xA;      &#34;version&#34;: &#34;1.3.0-2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libnsl&#34;,&#xA;        &#34;version&#34;: &#34;1.3.0-2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zV4ikAKeqBYFSvXnkFMYgg==&#34;: {&#xA;      &#34;id&#34;: &#34;zV4ikAKeqBYFSvXnkFMYgg==&#34;,&#xA;      &#34;name&#34;: &#34;libpam0g&#34;,&#xA;      &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;1.4.0-9+deb11u1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zw9OGAXs3mWkBkmfKzbfqg==&#34;: {&#xA;      &#34;id&#34;: &#34;zw9OGAXs3mWkBkmfKzbfqg==&#34;,&#xA;      &#34;name&#34;: &#34;libapt-pkg6.0&#34;,&#xA;      &#34;version&#34;: &#34;2.2.4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;apt&#34;,&#xA;        &#34;version&#34;: &#34;2.2.4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;amd64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;distributions&#34;: {&#xA;    &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;: {&#xA;      &#34;id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;      &#34;did&#34;: &#34;debian&#34;,&#xA;      &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;      &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;      &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;      &#34;version_id&#34;: &#34;11&#34;,&#xA;      &#34;arch&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;,&#xA;      &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;    }&#xA;  },&#xA;  &#34;repository&#34;: {&#xA;    &#34;84bc39b1-ea76-4e6c-b1b9-99ea1a0b6a1e&#34;: {&#xA;      &#34;id&#34;: &#34;84bc39b1-ea76-4e6c-b1b9-99ea1a0b6a1e&#34;,&#xA;      &#34;name&#34;: &#34;pypi&#34;,&#xA;      &#34;uri&#34;: &#34;https://pypi.org/simple&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;environments&#34;: {&#xA;    &#34;+GDQTbek1zYvATiVR/wBCA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;+aaqENN9U+Kuxcb1tQ8Utg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;+ol9cHiNc+RWiD7Kw3TLCg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;05vApGRmP6ko1S0ji87IIQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;0jMyX7UCIuSpntMN1r7Ofg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;1jyJPCL93kiEbfmNKeyz3g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:426f79092341b48e1b019e36b0a4bfac170655f18165147df411a1ca549d85a0&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;84bc39b1-ea76-4e6c-b1b9-99ea1a0b6a1e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;2MObxiEVNllmUEzdVZM5qw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;3f992oeEQfSQxRA0nlq8Wg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;4672uZtn8TnHDEzWVyhfjw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;4jCPzhS6OWt4agz9d/cfTw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;5zxxTA220k9gPCegfDHkag==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;7a3yla6TRFZrhmAreU7f8Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;8alfBYUr5uWbAyB5PrY8Hg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;9snKXrH4dQy2IXHQ01Lg0A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Akbft1KN+9FKNhh1tM25eA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;BJL42acLPAR8bEnmM1Z3mg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;CBzoMmlXBcyP54HOnauO0g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;CpILSbg3p6D7Gsp8sCW1Rg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;D0G6c/ML9XX4eoGHgx1jeQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;DY5Co0gkGtbgwDlkjfJLWA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:426f79092341b48e1b019e36b0a4bfac170655f18165147df411a1ca549d85a0&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;84bc39b1-ea76-4e6c-b1b9-99ea1a0b6a1e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;DtMxcnDA8Je9vAHjmzagaA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;EVGnnBfWyiVHhoIR4vEpgg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ExYxXcgoIRjAjUObwDE4jA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;FJIijlwFNqvdoVBcfTF/pg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;FOAAB3KiNsLyi03hQsjRTA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;FrUy4mOCaHm5aGT53as3JQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;G/7q+D+DsqYAVnohcyuzgQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;GGaavnLgXX31qx9chfhdOQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Gm6VA87iOnaQ0rWR6oO9eA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;HFwGHerHwgvY8vkjr3x1Pg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:426f79092341b48e1b019e36b0a4bfac170655f18165147df411a1ca549d85a0&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;84bc39b1-ea76-4e6c-b1b9-99ea1a0b6a1e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;IQfQp74RcAWE7jHtQsMLHg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;IiJKm8T4olfm6rhuKayFOw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Jg2vDvx1JxyPDIrUzzR9NQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;LOfpAnA/2f7zE4SFJCrxVg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;LVHVhWoZgWwWvOspyUwb1w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;MvKvHHnD0jaLaWpyHvkhgQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;NA4G2YrIZ73fsX7d5r5rGw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;NzkVb7F31E+Vxxz3PCS6tg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;OgJFdUXRfF1Ls8u1+eOivw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;PaaRbD/FkW3JARtSKQgRcQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;PgPY5hWnihXRN45byvzY0g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;R1TkRM71ql+JWgz0VF5ESQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;RAMuXEdVU4AJ/z4aiK/NNg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;84bc39b1-ea76-4e6c-b1b9-99ea1a0b6a1e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;RYsqO4ROpGMzzCO5WaTrlw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;RgdwX+VC70nXZ2E527PXaA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;SWnjL4fWu+WMpxhSCWLhZQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;T5NuX1yinNyGoZNN2r9u4Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;VVXsYlCxogg17Ti1iR03Mw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;VbNyM3GfR5vEmJdFAiKqrA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;Wi4oa03apqVdR6okNeZiNA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ZPlAztePXX+uFLVDX2lgNQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ZWeYh81MRCu1nh3mOyptIA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bGWj1aSf0wvrecU/pdTv5A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bHkSxcl6e1quNxLGb6uX8A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;bTSLWiizipO2axtmvXFuVg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;be3s5y0dx4bgsQboIoDduw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;brvvAQ6V7yp7QbUuk+W5Hg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;d4b/e0nx+/vPWuPB7oDzPw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dRfu6Up2F2Ze+gJ21oSeug==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dUT53gagQO5Ac9Bdlu5dAw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dXglURzzdbLnOf14mab1Hg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dobmrwm7aq9puvFHwNgXxw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;dv3AlW8tBL4D0mEPW7/Z2Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;eF2QIdrTmJlWmjQTkhntow==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;84bc39b1-ea76-4e6c-b1b9-99ea1a0b6a1e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;elSR7m8uLWd/kMl2jxTm/A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;evNF5YpSAxyFV7iWv3lSVw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;fCmdLCR2Ix0ldnZL1Fa52A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;fqwKjkzVNvsxh6040zt05g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;fyM9Y65kt8cTfJv4LKF7bg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;gP9HgvZWct50Kw/hM7BCKg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;gv6x84VyNacZgvJrC59jbQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;hdNUjYIlrdEAtBWAggakAw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;i4JkQ9JgSpZVyPFWOY5Bxw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;iWqdRZmp08/Tx22qEtmjJg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;jErhz6PtXvAy/EPWJ425rA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;jKa8Us2cqGejhOc2/n5DDA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;kq4lGEwi4agkgAJAkDs9Ng==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:426f79092341b48e1b019e36b0a4bfac170655f18165147df411a1ca549d85a0&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;84bc39b1-ea76-4e6c-b1b9-99ea1a0b6a1e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;krch6TQqNWzRi5F/dDkF+Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;l5lCPjtOmPM8/LLh9+NjeQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;l89yAZ/vyULk4EoaRdbg9w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:426f79092341b48e1b019e36b0a4bfac170655f18165147df411a1ca549d85a0&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;84bc39b1-ea76-4e6c-b1b9-99ea1a0b6a1e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;lCjIskl1HulEHShaXtgmwQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;lvz5sq0NbU6sy/F1tg9uiQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;mlFDx1iAC2OWpmYHut2JHw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;nV87o429QBKIpM8DyOv4wg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ngOu/a+sfrdDkZtETF1mgg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;nmd/xrCD27AKRWAzA5JZCA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;npX4tBmidkxp2QJN/c3Ktw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;nwapLKtbHTjy1u8+aA0X+Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;84bc39b1-ea76-4e6c-b1b9-99ea1a0b6a1e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;oH9T0w9ZyXDCGJ6Np6n1Iw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;ozJ983JkaV259+RUbqutzw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;p+J9YgA22NC8PDODpTSxgw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;pHAWej2qVWZtoCQ5DGoRcQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;pZoLgWqHDgjhYQPevrtwdg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;q78XIEiJs5tQHLZtjoU3Fg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;qN2BSWBeEFRJnExMNJ1S0A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;qrPZzwjmppjOiQbrGk5IQA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;rJ4UB7yOdBPwgrk5WLwIQw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;rUyBCRoo9C2erJrGUkvuDQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;s66OGd0F2Pbemhmyrg2R9w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;sU05gaIadSYQd4+DxTnInw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;sXwy5mmgqLM9WC30BdKwTA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;tNSJ6slY9zv+TZ6de2MVDQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;tYADP/V07/lE8Qno1R/hhg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;uRB+svwXXxpR9DkvUVmAUQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;python:usr/local/lib/python3.11/site-packages&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:426f79092341b48e1b019e36b0a4bfac170655f18165147df411a1ca549d85a0&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;84bc39b1-ea76-4e6c-b1b9-99ea1a0b6a1e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;uXsuLx/plg6mDddGlE/9EA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;vqKK+x/7cGHNjLr4L7x4uQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;wkuBBC4B84P3b4K0fGF0OQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;xaMEpa2lawXi7R9jqzX8hA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;yYcMjCGhY/mc+KraTEHSJg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zL6jHnohFUDkhEaUeTlPOQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zQ8wKwnOqSw7e/gsx76vLQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zRv/Q67g6qJWTz0qqj4+BA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zV4ikAKeqBYFSvXnkFMYgg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ],&#xA;    &#34;zw9OGAXs3mWkBkmfKzbfqg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;var/lib/dpkg/status&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#34;,&#xA;        &#34;distribution_id&#34;: &#34;5ad61b23-0caf-4921-8049-6ab39bd3cb7a&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      }&#xA;    ]&#xA;  },&#xA;  &#34;vulnerabilities&#34;: {&#xA;    &#34;+N61/5529gFt7RkD8ooeKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+N61/5529gFt7RkD8ooeKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0465&#34;,&#xA;      &#34;description&#34;: &#34;Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks.  Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether.  Policy processing is disabled by default but can be enabled by passing the `-policy&#39; argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0465&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u5&#34;&#xA;    },&#xA;    &#34;+x9OyXfXk9PrekfsnPKwlg==&#34;: {&#xA;      &#34;id&#34;: &#34;+x9OyXfXk9PrekfsnPKwlg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-13529&#34;,&#xA;      &#34;description&#34;: &#34;An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2020-13529&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/7UJLAHsMPxTtTxvuPgrzA==&#34;: {&#xA;      &#34;id&#34;: &#34;/7UJLAHsMPxTtTxvuPgrzA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45491&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-45491&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u6&#34;&#xA;    },&#xA;    &#34;/YwO4YLRGgF2uWU55V6+MQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/YwO4YLRGgF2uWU55V6+MQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-1010022&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \&#34;this is being treated as a non-security bug and no real threat.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-1010022&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;08pa4udz9bnA9IOsE208DA==&#34;: {&#xA;      &#34;id&#34;: &#34;08pa4udz9bnA9IOsE208DA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4039&#34;,&#xA;      &#34;description&#34;: &#34;**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains  that target AArch64 allows an attacker to exploit an existing buffer  overflow in dynamically-sized local variables in your application  without this being detected. This stack-protector failure only applies  to C99-style dynamically-sized local variables or those created using  alloca(). The stack-protector operates as intended for statically-sized  local variables.  The default behavior when the stack-protector  detects an overflow is to terminate your application, resulting in  controlled loss of availability. An attacker who can exploit a buffer  overflow without triggering the stack-protector might be able to change  program flow control to cause an uncontrolled loss of availability or to  go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4039&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-10&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;: {&#xA;      &#34;id&#34;: &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-26458&#34;,&#xA;      &#34;description&#34;: &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-26458&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0q/btA3zBEGWWmFxU7cNig==&#34;: {&#xA;      &#34;id&#34;: &#34;0q/btA3zBEGWWmFxU7cNig==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40225&#34;,&#xA;      &#34;description&#34;: &#34;In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-40225&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u8&#34;&#xA;    },&#xA;    &#34;1U/zi3CEao+52y8LKU0uvw==&#34;: {&#xA;      &#34;id&#34;: &#34;1U/zi3CEao+52y8LKU0uvw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36084&#34;,&#xA;      &#34;description&#34;: &#34;The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36084&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;1VnWeA5AZgybyD8+PiXyiw==&#34;: {&#xA;      &#34;id&#34;: &#34;1VnWeA5AZgybyD8+PiXyiw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-70873&#34;,&#xA;      &#34;description&#34;: &#34;An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-70873&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1dwwvWkARnFe67yAAGVglQ==&#34;: {&#xA;      &#34;id&#34;: &#34;1dwwvWkARnFe67yAAGVglQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31438&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \&#34;a reply denying that any of the finding was a security vulnerability.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31438&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;27BVJE6xR0Z84LzifDnFYA==&#34;: {&#xA;      &#34;id&#34;: &#34;27BVJE6xR0Z84LzifDnFYA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-48303&#34;,&#xA;      &#34;description&#34;: &#34;GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-48303&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.34+dfsg-1+deb11u1&#34;&#xA;    },&#xA;    &#34;3QDeWfKuntq5YxjjCuZXRQ==&#34;: {&#xA;      &#34;id&#34;: &#34;3QDeWfKuntq5YxjjCuZXRQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write.  Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application.  The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the BIO implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-68160&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;3Z3QMUqCN4dQV+f8cjn1eA==&#34;: {&#xA;      &#34;id&#34;: &#34;3Z3QMUqCN4dQV+f8cjn1eA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file.  Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service.  The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash.  Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial of Service. For these reasons the issue was assessed as Low severity.  The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the TimeStamp Response implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.  OpenSSL 1.0.2 is not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69420&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;3cBlPR7Tm4BIC/+wflldAg==&#34;: {&#xA;      &#34;id&#34;: &#34;3cBlPR7Tm4BIC/+wflldAg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12243&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-12243&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u7&#34;&#xA;    },&#xA;    &#34;5+uzHCKkmvMK8jl2uJkFqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5+uzHCKkmvMK8jl2uJkFqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32777&#34;,&#xA;      &#34;description&#34;: &#34;libexpat before 2.7.5 allows an infinite loop while parsing DTD content.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-32777&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;: {&#xA;      &#34;id&#34;: &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-37370&#34;,&#xA;      &#34;description&#34;: &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-37370&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u5&#34;&#xA;    },&#xA;    &#34;5Cmp5KJXv+nVwwcs5/Kz7w==&#34;: {&#xA;      &#34;id&#34;: &#34;5Cmp5KJXv+nVwwcs5/Kz7w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-50602&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-50602&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u7&#34;&#xA;    },&#xA;    &#34;5IA1PesIyj05J2Yx0YB4tQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5IA1PesIyj05J2Yx0YB4tQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;ECHO-3d34-cec5-cf72&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-23T11:00:38Z&#34;,&#xA;      &#34;links&#34;: &#34;https://advisory.echohq.com/cve/CVE-2026-24049&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;wheel&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=0.45.1%2Becho.1&#34;&#xA;    },&#xA;    &#34;5OqCQlhu6kV+tAsgGEGuwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;5OqCQlhu6kV+tAsgGEGuwQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27171&#34;,&#xA;      &#34;description&#34;: &#34;zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-27171&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5rGwN3bKZLMvxcM/W4jj+A==&#34;: {&#xA;      &#34;id&#34;: &#34;5rGwN3bKZLMvxcM/W4jj+A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;      &#34;description&#34;: &#34;systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-29111&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u8&#34;&#xA;    },&#xA;    &#34;6j23t/n6B77cQMxfCeLKzA==&#34;: {&#xA;      &#34;id&#34;: &#34;6j23t/n6B77cQMxfCeLKzA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-12133&#34;,&#xA;      &#34;description&#34;: &#34;A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-12133&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;4.16.0-2+deb11u2&#34;&#xA;    },&#xA;    &#34;6jg3v7lJ92IZCQpZydR2sA==&#34;: {&#xA;      &#34;id&#34;: &#34;6jg3v7lJ92IZCQpZydR2sA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28757&#34;,&#xA;      &#34;description&#34;: &#34;libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-28757&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7DtFnnE8FjIpCQKunutpeg==&#34;: {&#xA;      &#34;id&#34;: &#34;7DtFnnE8FjIpCQKunutpeg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-16156&#34;,&#xA;      &#34;description&#34;: &#34;CPAN 2.28 allows Signature Verification Bypass.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2020-16156&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;5.32.1-4+deb11u4&#34;&#xA;    },&#xA;    &#34;9JIazCQjSvYhpG9KE6d7Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;9JIazCQjSvYhpG9KE6d7Pg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8058&#34;,&#xA;      &#34;description&#34;: &#34;The regcomp function in the GNU C library version from 2.4 to 2.41 is  subject to a double free if some previous allocation fails. It can be  accomplished either by a malloc failure or by using an interposed malloc  that injects random malloc failures. The double free can allow buffer  manipulation depending of how the regex is constructed. This issue  affects all architectures and ABIs supported by the GNU C library.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-8058&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9ThuL3zLKpmduvKpiDZ60w==&#34;: {&#xA;      &#34;id&#34;: &#34;9ThuL3zLKpmduvKpiDZ60w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-24515&#34;,&#xA;      &#34;description&#34;: &#34;In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-24515&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9sNDKQtqg7Z3gJr//JQlvg==&#34;: {&#xA;      &#34;id&#34;: &#34;9sNDKQtqg7Z3gJr//JQlvg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32990&#34;,&#xA;      &#34;description&#34;: &#34;A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-32990&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u8&#34;&#xA;    },&#xA;    &#34;9xk1p07t4ZV999E3HyfhVA==&#34;: {&#xA;      &#34;id&#34;: &#34;9xk1p07t4ZV999E3HyfhVA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5704&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tar. A remote attacker could exploit this vulnerability by crafting a malicious archive, leading to hidden file injection with fully attacker-controlled content. This bypasses pre-extraction inspection mechanisms, potentially allowing an attacker to introduce malicious files onto a system without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-5704&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ANq7+l7+5U6IDt9eU02u5w==&#34;: {&#xA;      &#34;id&#34;: &#34;ANq7+l7+5U6IDt9eU02u5w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3219&#34;,&#xA;      &#34;description&#34;: &#34;GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-3219&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ASrdm9EROwWp9Ip2w7HH5w==&#34;: {&#xA;      &#34;id&#34;: &#34;ASrdm9EROwWp9Ip2w7HH5w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3821&#34;,&#xA;      &#34;description&#34;: &#34;An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-3821&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u2&#34;&#xA;    },&#xA;    &#34;AvPdNumiwGnBie+lo1du3A==&#34;: {&#xA;      &#34;id&#34;: &#34;AvPdNumiwGnBie+lo1du3A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31486&#34;,&#xA;      &#34;description&#34;: &#34;HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31486&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;B78vSIll2muNDyY3F7urzw==&#34;: {&#xA;      &#34;id&#34;: &#34;B78vSIll2muNDyY3F7urzw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34743&#34;,&#xA;      &#34;description&#34;: &#34;XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version 5.8.3, if lzma_index_decoder() was used to decode an Index that contained no Records, the resulting lzma_index was left in a state where where a subsequent lzma_index_append() would allocate too little memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-34743&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz-utils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8941&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a \&#34;complete\&#34; fix for CVE-2025-6020.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-8941&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BtqRPc7F47wJWygPNOxw1w==&#34;: {&#xA;      &#34;id&#34;: &#34;BtqRPc7F47wJWygPNOxw1w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32778&#34;,&#xA;      &#34;description&#34;: &#34;libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after an earlier ouf-of-memory condition.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-32778&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BxMnseA9J6OW2RWxSrlbyQ==&#34;: {&#xA;      &#34;id&#34;: &#34;BxMnseA9J6OW2RWxSrlbyQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36690&#34;,&#xA;      &#34;description&#34;: &#34;A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36690&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.34.1-3+deb11u1&#34;&#xA;    },&#xA;    &#34;CaLsKNvkpKlxKVBlUnje9Q==&#34;: {&#xA;      &#34;id&#34;: &#34;CaLsKNvkpKlxKVBlUnje9Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36087&#34;,&#xA;      &#34;description&#34;: &#34;The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36087&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;CfS0L/tTata7W0FXXtQ4EQ==&#34;: {&#xA;      &#34;id&#34;: &#34;CfS0L/tTata7W0FXXtQ4EQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4438&#34;,&#xA;      &#34;description&#34;: &#34;Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library&#39;s DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-4438&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CtYegggqGbMfg16G/qfITQ==&#34;: {&#xA;      &#34;id&#34;: &#34;CtYegggqGbMfg16G/qfITQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2013-4235&#34;,&#xA;      &#34;description&#34;: &#34;shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2013-4235&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DJOf0vCfrT4GvRr/tBJhbg==&#34;: {&#xA;      &#34;id&#34;: &#34;DJOf0vCfrT4GvRr/tBJhbg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33601&#34;,&#xA;      &#34;description&#34;: &#34;nscd: netgroup cache may terminate daemon on memory allocation failure  The Name Service Cache Daemon&#39;s (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a denial of service to the clients.  The flaw was introduced in glibc 2.15 when the cache was added to nscd.  This vulnerability is only present in the nscd binary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-33601&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u10&#34;&#xA;    },&#xA;    &#34;DRKFIYYNzLumACBV1CW/rw==&#34;: {&#xA;      &#34;id&#34;: &#34;DRKFIYYNzLumACBV1CW/rw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-35737&#34;,&#xA;      &#34;description&#34;: &#34;SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-35737&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DS2nhayHHtinLlFzZheSwg==&#34;: {&#xA;      &#34;id&#34;: &#34;DS2nhayHHtinLlFzZheSwg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66382&#34;,&#xA;      &#34;description&#34;: &#34;In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-66382&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DfxJWBpJUY1aHu0ZUSilDg==&#34;: {&#xA;      &#34;id&#34;: &#34;DfxJWBpJUY1aHu0ZUSilDg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-6829&#34;,&#xA;      &#34;description&#34;: &#34;cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt&#39;s ElGamal implementation.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2018-6829&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DkvPjH9ZM3anH55rsU+i3w==&#34;: {&#xA;      &#34;id&#34;: &#34;DkvPjH9ZM3anH55rsU+i3w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-41080&#34;,&#xA;      &#34;description&#34;: &#34;libexpat before 2.7.6 uses insufficient entropy, and thus hash flooding can occur via a crafted XML document.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-41080&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ELw1b1vO2YOtV7qNQijgCw==&#34;: {&#xA;      &#34;id&#34;: &#34;ELw1b1vO2YOtV7qNQijgCw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4437&#34;,&#xA;      &#34;description&#34;: &#34;Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library&#39;s DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-4437&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EYo03ICovWfCjw2cKpwx4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;EYo03ICovWfCjw2cKpwx4Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2005-2541&#34;,&#xA;      &#34;description&#34;: &#34;Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2005-2541&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EajCJi704nU1+LqESNMC1w==&#34;: {&#xA;      &#34;id&#34;: &#34;EajCJi704nU1+LqESNMC1w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0727&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack  Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly.  A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue.  OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass().  We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant.  The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-0727&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;EvarhwbaAMrD3meGYFByGg==&#34;: {&#xA;      &#34;id&#34;: &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-50495&#34;,&#xA;      &#34;description&#34;: &#34;NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-50495&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;F0zkrLGlbsix59P9mqoAOg==&#34;: {&#xA;      &#34;id&#34;: &#34;F0zkrLGlbsix59P9mqoAOg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-30258&#34;,&#xA;      &#34;description&#34;: &#34;In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a \&#34;verification DoS.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-30258&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;G45dR+E8Wb+bEhCdwuqUDg==&#34;: {&#xA;      &#34;id&#34;: &#34;G45dR+E8Wb+bEhCdwuqUDg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-20838&#34;,&#xA;      &#34;description&#34;: &#34;libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \\X or \\R has more than one fixed quantifier, a related issue to CVE-2019-20454.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-20838&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GPLYq884jQKVksfMc+b7OQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GPLYq884jQKVksfMc+b7OQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-1304&#34;,&#xA;      &#34;description&#34;: &#34;An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-1304&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.46.2-2+deb11u1&#34;&#xA;    },&#xA;    &#34;GRlufCZFwHNK64OQNCFIcg==&#34;: {&#xA;      &#34;id&#34;: &#34;GRlufCZFwHNK64OQNCFIcg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2013-4392&#34;,&#xA;      &#34;description&#34;: &#34;systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2013-4392&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GezxxUl3QPWUTitg/VHmlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GezxxUl3QPWUTitg/VHmlQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-1010024&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \&#34;this is being treated as a non-security bug and no real threat.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-1010024&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GmBi7n85v8sX6ItoMSgvlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;GmBi7n85v8sX6ItoMSgvlQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9230&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write.  Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code.  Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy.  The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-9230&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u4&#34;&#xA;    },&#xA;    &#34;HuTBrVHKx7uaMtQjiqifKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;HuTBrVHKx7uaMtQjiqifKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0567&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-0567&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u5&#34;&#xA;    },&#xA;    &#34;IJPGr43VMeLym6tW3EWgdg==&#34;: {&#xA;      &#34;id&#34;: &#34;IJPGr43VMeLym6tW3EWgdg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-8176&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-8176&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IvA5abshk33BAuuBar/pVQ==&#34;: {&#xA;      &#34;id&#34;: &#34;IvA5abshk33BAuuBar/pVQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45492&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-45492&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u6&#34;&#xA;    },&#xA;    &#34;IwuADin5bagOGQErETBgWw==&#34;: {&#xA;      &#34;id&#34;: &#34;IwuADin5bagOGQErETBgWw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4046&#34;,&#xA;      &#34;description&#34;: &#34;The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application.    This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-4046&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Jl0PQIP9L3ufSvQ2j71iww==&#34;: {&#xA;      &#34;id&#34;: &#34;Jl0PQIP9L3ufSvQ2j71iww==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-r9hx-vwmv-q579&#34;,&#xA;      &#34;description&#34;: &#34;pypa/setuptools vulnerable to Regular Expression Denial of Service (ReDoS)&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-23T00:30:23Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2022-40897 https://github.com/pypa/setuptools/issues/3659 https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be https://setuptools.pypa.io/en/latest https://security.netapp.com/advisory/ntap-20240621-0006 https://security.netapp.com/advisory/ntap-20230214-0001 https://pyup.io/vulnerabilities/CVE-2022-40897/52495 https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R https://lists.debian.org/debian-lts-announce/2024/09/msg00018.html https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1 https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200 https://github.com/pypa/setuptools https://github.com/pypa/advisory-database/tree/main/vulns/setuptools/PYSEC-2022-43012.yaml&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=65.5.1&#34;&#xA;    },&#xA;    &#34;KLrAiYCJHdmWQ2RaqUywlA==&#34;: {&#xA;      &#34;id&#34;: &#34;KLrAiYCJHdmWQ2RaqUywlA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4304&#34;,&#xA;      &#34;description&#34;: &#34;A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE.  For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-4304&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;KZ3Jt7zkiM272dGLstI4XA==&#34;: {&#xA;      &#34;id&#34;: &#34;KZ3Jt7zkiM272dGLstI4XA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2013-0340&#34;,&#xA;      &#34;description&#34;: &#34;expat before version 2.4.0 does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue.  NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2013-0340&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KaoEuixR8E5nnpGZ1pG25w==&#34;: {&#xA;      &#34;id&#34;: &#34;KaoEuixR8E5nnpGZ1pG25w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0553&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-0553&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u5&#34;&#xA;    },&#xA;    &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;: {&#xA;      &#34;id&#34;: &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-10041&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-10041&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KwgIGMm765S+zvIBAwM9+g==&#34;: {&#xA;      &#34;id&#34;: &#34;KwgIGMm765S+zvIBAwM9+g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4899&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-4899&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libzstd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LD4zPH3rZZkbSPN5ojHClA==&#34;: {&#xA;      &#34;id&#34;: &#34;LD4zPH3rZZkbSPN5ojHClA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;TEMP-0628843-DBAD28&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MDmWztEMrTY+VyVp5c+Fvw==&#34;: {&#xA;      &#34;id&#34;: &#34;MDmWztEMrTY+VyVp5c+Fvw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;TEMP-0841856-B18BAF&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/TEMP-0841856-B18BAF&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bash&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MXRm//dBCnWFem5zffvqmA==&#34;: {&#xA;      &#34;id&#34;: &#34;MXRm//dBCnWFem5zffvqmA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3715&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-3715&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bash&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MYYkxlB4Ank1zsdIh41apg==&#34;: {&#xA;      &#34;id&#34;: &#34;MYYkxlB4Ank1zsdIh41apg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2961&#34;,&#xA;      &#34;description&#34;: &#34;The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-2961&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u9&#34;&#xA;    },&#xA;    &#34;MdrEi+/OrLlW3zDrheID2Q==&#34;: {&#xA;      &#34;id&#34;: &#34;MdrEi+/OrLlW3zDrheID2Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59375&#34;,&#xA;      &#34;description&#34;: &#34;libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-59375&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Mmh4dm/jzK4QVSJqQVsCDw==&#34;: {&#xA;      &#34;id&#34;: &#34;Mmh4dm/jzK4QVSJqQVsCDw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data.  Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attributes() function can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service.  The function PKCS7_digest_from_attributes() accesses the message digest attribute value without validating its type. When the type is not V_ASN1_OCTET_STRING, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash.  Exploiting this vulnerability requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of the exploit is just a Denial of Service, the PKCS7 API is legacy and applications should be using the CMS API instead. For these reasons the issue was assessed as Low severity.  The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#7 parsing implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-22796&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;Mnnh2CmlXNNRCBXvqdG9ig==&#34;: {&#xA;      &#34;id&#34;: &#34;Mnnh2CmlXNNRCBXvqdG9ig==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28387&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: An uncommon configuration of clients performing DANE TLSA-based server authentication, when paired with uncommon server DANE TLSA records, may result in a use-after-free and/or double-free on the client side.  Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code.  However, the issue only affects clients that make use of TLSA records with both the PKIX-TA(0/PKIX-EE(1) certificate usages and the DANE-TA(2) certificate usage.  By far the most common deployment of DANE is in SMTP MTAs for which RFC7672 recommends that clients treat as &#39;unusable&#39; any TLSA records that have the PKIX certificate usages.  These SMTP (or other similar) clients are not vulnerable to this issue.  Conversely, any clients that support only the PKIX usages, and ignore the DANE-TA(2) usage are also not vulnerable.  The client would also need to be communicating with a server that publishes a TLSA RRset with both types of TLSA records.  No FIPS modules are affected by this issue, the problem code is outside the FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-28387&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Mxv06g47iCk7QIqi7Xbojw==&#34;: {&#xA;      &#34;id&#34;: &#34;Mxv06g47iCk7QIqi7Xbojw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45853&#34;,&#xA;      &#34;description&#34;: &#34;MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-45853&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NYWveHKKsIYIKl+vE8UEhw==&#34;: {&#xA;      &#34;id&#34;: &#34;NYWveHKKsIYIKl+vE8UEhw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;TEMP-0517018-A83CE6&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/TEMP-0517018-A83CE6&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sysvinit&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;: {&#xA;      &#34;id&#34;: &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-22365&#34;,&#xA;      &#34;description&#34;: &#34;linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-22365&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.4.0-9+deb11u2&#34;&#xA;    },&#xA;    &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;: {&#xA;      &#34;id&#34;: &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-26461&#34;,&#xA;      &#34;description&#34;: &#34;Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-26461&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;: {&#xA;      &#34;id&#34;: &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3576&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-3576&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u7&#34;&#xA;    },&#xA;    &#34;OTqcMsspao5I6JZMETZ06w==&#34;: {&#xA;      &#34;id&#34;: &#34;OTqcMsspao5I6JZMETZ06w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0915&#34;,&#xA;      &#34;description&#34;: &#34;Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library&#39;s DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-0915&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;P4mYk7npVU6t91mlbAb8QA==&#34;: {&#xA;      &#34;id&#34;: &#34;P4mYk7npVU6t91mlbAb8QA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2511&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions  Impact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service  This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation.  This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients.  The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-2511&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;: {&#xA;      &#34;id&#34;: &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28085&#34;,&#xA;      &#34;description&#34;: &#34;wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users&#39; terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-28085&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.36.1-8+deb11u2&#34;&#xA;    },&#xA;    &#34;PUY4fn57nsAU2qBLtgRtdw==&#34;: {&#xA;      &#34;id&#34;: &#34;PUY4fn57nsAU2qBLtgRtdw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-6vgw-5pg2-w6jp&#34;,&#xA;      &#34;description&#34;: &#34;pip Path Traversal vulnerability&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-02T15:30:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2026-1703 https://github.com/pypa/pip/pull/13777 https://github.com/pypa/pip/commit/8e227a9be4faa9594e05d02ca05a413a2a4e7735 https://github.com/pypa/pip https://mail.python.org/archives/list/security-announce@python.org/thread/WIEA34D4TABF2UNQJAOMXKCICSPBE2DJ&#34;,&#xA;      &#34;severity&#34;: &#34;LOW&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=26.0&#34;&#xA;    },&#xA;    &#34;Pj9V3uC2c9o+P6lTpzzGeA==&#34;: {&#xA;      &#34;id&#34;: &#34;Pj9V3uC2c9o+P6lTpzzGeA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;PYSEC-2025-49&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-17T16:15:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf https://lists.debian.org/debian-lts-announce/2025/05/msg00035.html https://github.com/pypa/setuptools/issues/4946 https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=78.1.1&#34;&#xA;    },&#xA;    &#34;QEROZuK4q+zt8UbP6ZV8wg==&#34;: {&#xA;      &#34;id&#34;: &#34;QEROZuK4q+zt8UbP6ZV8wg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: When using the low-level OCB API directly with AES-NI or\u003cbr\u003eother hardware-accelerated code paths, inputs whose length is not a multiple\u003cbr\u003eof 16 bytes can leave the final partial block unencrypted and unauthenticated.\u003cbr\u003e\u003cbr\u003eImpact summary: The trailing 1-15 bytes of a message may be exposed in\u003cbr\u003ecleartext on encryption and are not covered by the authentication tag,\u003cbr\u003eallowing an attacker to read or tamper with those bytes without detection.\u003cbr\u003e\u003cbr\u003eThe low-level OCB encrypt and decrypt routines in the hardware-accelerated\u003cbr\u003estream path process full 16-byte blocks but do not advance the input/output\u003cbr\u003epointers. The subsequent tail-handling code then operates on the original\u003cbr\u003ebase pointers, effectively reprocessing the beginning of the buffer while\u003cbr\u003eleaving the actual trailing bytes unprocessed. The authentication checksum\u003cbr\u003ealso excludes the true tail bytes.\u003cbr\u003e\u003cbr\u003eHowever, typical OpenSSL consumers using EVP are not affected because the\u003cbr\u003ehigher-level EVP and provider OCB implementations split inputs so that full\u003cbr\u003eblocks and trailing partial blocks are processed in separate calls, avoiding\u003cbr\u003ethe problematic code path. Additionally, TLS does not use OCB ciphersuites.\u003cbr\u003eThe vulnerability only affects applications that call the low-level\u003cbr\u003eCRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with\u003cbr\u003enon-block-aligned lengths in a single call on hardware-accelerated builds.\u003cbr\u003eFor these reasons the issue was assessed as Low severity.\u003cbr\u003e\u003cbr\u003eThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected\u003cbr\u003eby this issue, as OCB mode is not a FIPS-approved algorithm.\u003cbr\u003e\u003cbr\u003eOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\u003cbr\u003e\u003cbr\u003eOpenSSL 1.0.2 is not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69418&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;QGq5D5QwQKPerzYOBVoSsg==&#34;: {&#xA;      &#34;id&#34;: &#34;QGq5D5QwQKPerzYOBVoSsg==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-cx63-2mw6-8hw5&#34;,&#xA;      &#34;description&#34;: &#34;setuptools vulnerable to Command Injection via package URL&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-15T03:30:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2024-6345 https://github.com/pypa/setuptools/pull/4332 https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0 https://github.com/pypa/setuptools https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5 https://lists.debian.org/debian-lts-announce/2024/09/msg00018.html&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=70.0.0&#34;&#xA;    },&#xA;    &#34;Qd2XnJZ3qaQ3AbyDXUaR2A==&#34;: {&#xA;      &#34;id&#34;: &#34;Qd2XnJZ3qaQ3AbyDXUaR2A==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;PYSEC-2022-43012&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-23T00:15:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200 https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/ https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1 https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be https://pyup.io/vulnerabilities/CVE-2022-40897/52495/&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=65.5.1&#34;&#xA;    },&#xA;    &#34;QopvyNp/5Ata9NdAUhFygw==&#34;: {&#xA;      &#34;id&#34;: &#34;QopvyNp/5Ata9NdAUhFygw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5278&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNU Coreutils. The sort utility&#39;s begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-5278&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SNR1VT02i1HBHxqGRTeBAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;SNR1VT02i1HBHxqGRTeBAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9820&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-9820&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u9&#34;&#xA;    },&#xA;    &#34;T2SiDOPpMK0bU0Y0qkOm1A==&#34;: {&#xA;      &#34;id&#34;: &#34;T2SiDOPpMK0bU0Y0qkOm1A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-1010025&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor&#39;s position is \&#34;ASLR bypass itself is not a vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-1010025&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;: {&#xA;      &#34;id&#34;: &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-24528&#34;,&#xA;      &#34;description&#34;: &#34;In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-24528&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u6&#34;&#xA;    },&#xA;    &#34;TN8d5UGyH2D+dtBNYjKyKg==&#34;: {&#xA;      &#34;id&#34;: &#34;TN8d5UGyH2D+dtBNYjKyKg==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;ECHO-ffe1-1d3c-d9bc&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-25T13:30:24Z&#34;,&#xA;      &#34;links&#34;: &#34;https://advisory.echohq.com/cve/CVE-2025-8869&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=25.2%2Becho.1&#34;&#xA;    },&#xA;    &#34;Tcuyjettc5LT9G5wj3mSxw==&#34;: {&#xA;      &#34;id&#34;: &#34;Tcuyjettc5LT9G5wj3mSxw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4450&#34;,&#xA;      &#34;description&#34;: &#34;The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \&#34;name\&#34; (e.g. \&#34;CERTIFICATE\&#34;), any header data and the payload data. If the function succeeds then the \&#34;name_out\&#34;, \&#34;header\&#34; and \&#34;data\&#34; arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack.  The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected.  These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0.  The OpenSSL asn1parse command line application is also impacted by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-4450&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;: {&#xA;      &#34;id&#34;: &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6141&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6141&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;U3JbUhrT2SqWNuYU5d13cQ==&#34;: {&#xA;      &#34;id&#34;: &#34;U3JbUhrT2SqWNuYU5d13cQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-33560&#34;,&#xA;      &#34;description&#34;: &#34;Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-33560&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;U5598afGvRaltva6Rjqnug==&#34;: {&#xA;      &#34;id&#34;: &#34;U5598afGvRaltva6Rjqnug==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4105&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-4105&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u8&#34;&#xA;    },&#xA;    &#34;Ud6njM/DPIrfSPiFct82Lw==&#34;: {&#xA;      &#34;id&#34;: &#34;Ud6njM/DPIrfSPiFct82Lw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-52426&#34;,&#xA;      &#34;description&#34;: &#34;libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-52426&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UdV1OleGh/0MAkug0ZAlcQ==&#34;: {&#xA;      &#34;id&#34;: &#34;UdV1OleGh/0MAkug0ZAlcQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25210&#34;,&#xA;      &#34;description&#34;: &#34;In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-25210&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VzolVkOS5HseGzVTLzDMfA==&#34;: {&#xA;      &#34;id&#34;: &#34;VzolVkOS5HseGzVTLzDMfA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39804&#34;,&#xA;      &#34;description&#34;: &#34;In GNU tar before 1.35, mishandled extension attributes in a PAX archive can lead to an application crash in xheader.c.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-39804&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.34+dfsg-1+deb11u1&#34;&#xA;    },&#xA;    &#34;WCGqond4znYKCRcm4xyPrg==&#34;: {&#xA;      &#34;id&#34;: &#34;WCGqond4znYKCRcm4xyPrg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2007-5686&#34;,&#xA;      &#34;description&#34;: &#34;initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts.  NOTE: because sshd detects the insecure permissions and does not log certain events, this also prevents sshd from logging failed authentication attempts by remote attackers.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2007-5686&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WG/hQnqUufOh6/5/mlRi/Q==&#34;: {&#xA;      &#34;id&#34;: &#34;WG/hQnqUufOh6/5/mlRi/Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31439&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent \&#34;a reply denying that any of the finding was a security vulnerability.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31439&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WHvU12ysgz1Ai1y1KSOiLA==&#34;: {&#xA;      &#34;id&#34;: &#34;WHvU12ysgz1Ai1y1KSOiLA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33599&#34;,&#xA;      &#34;description&#34;: &#34;nscd: Stack-based buffer overflow in netgroup cache  If the Name Service Cache Daemon&#39;s (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow.  This flaw was introduced in glibc 2.15 when the cache was added to nscd.  This vulnerability is only present in the nscd binary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-33599&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u10&#34;&#xA;    },&#xA;    &#34;WWnQMI7f7f75SgC9Dcl+QQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WWnQMI7f7f75SgC9Dcl+QQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;TEMP-0290435-0B57B5&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/TEMP-0290435-0B57B5&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WcYPrwv9PSVoVoof5MRsxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;WcYPrwv9PSVoVoof5MRsxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;PYSEC-2023-228&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-25T18:17:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://mail.python.org/archives/list/security-announce@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL/ https://github.com/pypa/pip/pull/12306&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=23.3&#34;&#xA;    },&#xA;    &#34;WxlxRC1KqAo8Mejv03fZGA==&#34;: {&#xA;      &#34;id&#34;: &#34;WxlxRC1KqAo8Mejv03fZGA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68972&#34;,&#xA;      &#34;description&#34;: &#34;In GnuPG through 2.4.8, if a signed message has \\f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an \&#34;invalid armor\&#34; message is printed during verification). This is related to use of \\f as a marker to denote truncation of a long plaintext line.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-68972&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Xce4H7xsVfrtYV2aXED7xA==&#34;: {&#xA;      &#34;id&#34;: &#34;Xce4H7xsVfrtYV2aXED7xA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-18018&#34;,&#xA;      &#34;description&#34;: &#34;In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX \&#34;-R -L\&#34; options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-18018&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XtT5+z5+yMbpdsyfkLItzA==&#34;: {&#xA;      &#34;id&#34;: &#34;XtT5+z5+yMbpdsyfkLItzA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6395&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6395&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u8&#34;&#xA;    },&#xA;    &#34;Y++3+aMTeU3vX7BI4/zG6w==&#34;: {&#xA;      &#34;id&#34;: &#34;Y++3+aMTeU3vX7BI4/zG6w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14831&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-14831&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u9&#34;&#xA;    },&#xA;    &#34;Y4A2Zm5xcsipvfluZVH5fA==&#34;: {&#xA;      &#34;id&#34;: &#34;Y4A2Zm5xcsipvfluZVH5fA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0861&#34;,&#xA;      &#34;description&#34;: &#34;Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.  Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this.  The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument.  This limits the malicious inputs for the alignment for memalign to the range [1\u003c\u003c62+ 1, 1\u003c\u003c63] and exactly 1\u003c\u003c63 for posix_memalign and aligned_alloc.  Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice.  An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-0861&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YXTNVVKQsWY/LFuomB715g==&#34;: {&#xA;      &#34;id&#34;: &#34;YXTNVVKQsWY/LFuomB715g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13151&#34;,&#xA;      &#34;description&#34;: &#34;Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-13151&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZbWtFXr0WyByV4kCb3M6FA==&#34;: {&#xA;      &#34;id&#34;: &#34;ZbWtFXr0WyByV4kCb3M6FA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5981&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-5981&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u4&#34;&#xA;    },&#xA;    &#34;ZdGgPSEZdeQ3XJo0+ZpAXQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ZdGgPSEZdeQ3XJo0+ZpAXQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-1010023&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \&#34;this is being treated as a non-security bug and no real threat.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-1010023&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZrZi02myDWWW0L5oPQj/cg==&#34;: {&#xA;      &#34;id&#34;: &#34;ZrZi02myDWWW0L5oPQj/cg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-11164&#34;,&#xA;      &#34;description&#34;: &#34;In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-11164&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZxTVeoHgmvhWXsV+xLzphA==&#34;: {&#xA;      &#34;id&#34;: &#34;ZxTVeoHgmvhWXsV+xLzphA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4813&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4813&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;aWm6E1ULjtuw0ydmFnsI4A==&#34;: {&#xA;      &#34;id&#34;: &#34;aWm6E1ULjtuw0ydmFnsI4A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6297&#34;,&#xA;      &#34;description&#34;: &#34;It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6297&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dpkg&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;afNm575eldgXY3DOGUNdqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;afNm575eldgXY3DOGUNdqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28388&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: When a delta CRL that contains a Delta CRL Indicator extension is processed a NULL pointer dereference might happen if the required CRL Number extension is missing.  Impact summary: A NULL pointer dereference can trigger a crash which leads to a Denial of Service for an application.  When CRL processing and delta CRL processing is enabled during X.509 certificate verification, the delta CRL processing does not check whether the CRL Number extension is NULL before dereferencing it. When a malformed delta CRL file is being processed, this parameter can be NULL, causing a NULL pointer dereference.  Exploiting this issue requires the X509_V_FLAG_USE_DELTAS flag to be enabled in the verification context, the certificate being verified to contain a freshestCRL extension or the base CRL to have the EXFLAG_FRESHEST flag set, and an attacker to provide a malformed CRL to an application that processes it.  The vulnerability is limited to Denial of Service and cannot be escalated to achieve code execution or memory disclosure. For that reason the issue was assessed as Low severity according to our Security Policy.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-28388&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;aqMHDRnPT+3QNU/8tSwsog==&#34;: {&#xA;      &#34;id&#34;: &#34;aqMHDRnPT+3QNU/8tSwsog==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-9192&#34;,&#xA;      &#34;description&#34;: &#34;In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by &#39;(|)(\\\\1\\\\1)*&#39; in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-9192&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;b2D8D2g8yPwuRhswdqF0Rw==&#34;: {&#xA;      &#34;id&#34;: &#34;b2D8D2g8yPwuRhswdqF0Rw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3446&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Checking excessively long DH keys or parameters may be very slow.  Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.  The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (&#39;p&#39; parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length.  However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large.  An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack.  The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check().  Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the &#39;-check&#39; option.  The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-3446&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1v-0~deb11u1&#34;&#xA;    },&#xA;    &#34;bBymk1eoEM+tVYB+/Crz+g==&#34;: {&#xA;      &#34;id&#34;: &#34;bBymk1eoEM+tVYB+/Crz+g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28835&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the \&#34;certtool --verify-chain\&#34; command.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-28835&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u6&#34;&#xA;    },&#xA;    &#34;bNvH54V1y9cXsGaCXVwFVw==&#34;: {&#xA;      &#34;id&#34;: &#34;bNvH54V1y9cXsGaCXVwFVw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-5rjg-fvgr-3xxf&#34;,&#xA;      &#34;description&#34;: &#34;setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-19T16:52:43Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf https://nvd.nist.gov/vuln/detail/CVE-2025-47273 https://github.com/pypa/setuptools/issues/4946 https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b https://github.com/pypa/advisory-database/tree/main/vulns/setuptools/PYSEC-2025-49.yaml https://github.com/pypa/setuptools https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88 https://lists.debian.org/debian-lts-announce/2025/05/msg00035.html&#34;,&#xA;      &#34;severity&#34;: &#34;HIGH&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setuptools&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=78.1.1&#34;&#xA;    },&#xA;    &#34;bX7iB3AnaRh9Z+itWa3Xyw==&#34;: {&#xA;      &#34;id&#34;: &#34;bX7iB3AnaRh9Z+itWa3Xyw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-31789&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Converting an excessively large OCTET STRING value to a hexadecimal string leads to a heap buffer overflow on 32 bit platforms.  Impact summary: A heap buffer overflow may lead to a crash or possibly an attacker controlled code execution or other undefined behavior.  If an attacker can supply a crafted X.509 certificate with an excessively large OCTET STRING value in extensions such as the Subject Key Identifier (SKID) or Authority Key Identifier (AKID) which are being converted to hex, the size of the buffer needed for the result is calculated as multiplication of the input length by 3. On 32 bit platforms, this multiplication may overflow resulting in the allocation of a smaller buffer and a heap buffer overflow.  Applications and services that print or log contents of untrusted X.509 certificates are vulnerable to this issue. As the certificates would have to have sizes of over 1 Gigabyte, printing or logging such certificates is a fairly unlikely operation and only 32 bit platforms are affected, this issue was assigned Low severity.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-31789&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bZ2m6J3EIvmTdjYJprlOKA==&#34;: {&#xA;      &#34;id&#34;: &#34;bZ2m6J3EIvmTdjYJprlOKA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36085&#34;,&#xA;      &#34;description&#34;: &#34;The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36085&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;bjAyJcmSN59FnAeiA6RMIg==&#34;: {&#xA;      &#34;id&#34;: &#34;bjAyJcmSN59FnAeiA6RMIg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28389&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: During processing of a crafted CMS EnvelopedData message with KeyAgreeRecipientInfo a NULL pointer dereference can happen.  Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resulting in Denial of Service.  When a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is processed, the optional parameters field of KeyEncryptionAlgorithmIdentifier is examined without checking for its presence. This results in a NULL pointer dereference if the field is missing.  Applications and services that call CMS_decrypt() on untrusted input (e.g., S/MIME processing or CMS-based protocols) are vulnerable.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-28389&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;brAAPyN4siIQT5bxa9xu4g==&#34;: {&#xA;      &#34;id&#34;: &#34;brAAPyN4siIQT5bxa9xu4g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-47038&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-47038&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;5.32.1-4+deb11u3&#34;&#xA;    },&#xA;    &#34;c9VxNhSZmjnQmY3rI/q1PA==&#34;: {&#xA;      &#34;id&#34;: &#34;c9VxNhSZmjnQmY3rI/q1PA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15281&#34;,&#xA;      &#34;description&#34;: &#34;Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-15281&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;: {&#xA;      &#34;id&#34;: &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-5709&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable \&#34;dbentry-\u003en_key_data\&#34; in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a \&#34;u4\&#34; variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2018-5709&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cZD87tDO2q60EFy3BAZ33g==&#34;: {&#xA;      &#34;id&#34;: &#34;cZD87tDO2q60EFy3BAZ33g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0464&#34;,&#xA;      &#34;description&#34;: &#34;A security vulnerability has been identified in all supported versions  of OpenSSL related to the verification of X.509 certificate chains that include policy constraints.  Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.  Policy processing is disabled by default but can be enabled by passing the `-policy&#39; argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0464&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u5&#34;&#xA;    },&#xA;    &#34;ce9B0jxjyNiCfG4VtZhnVw==&#34;: {&#xA;      &#34;id&#34;: &#34;ce9B0jxjyNiCfG4VtZhnVw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2011-4116&#34;,&#xA;      &#34;description&#34;: &#34;_is_safe in the File::Temp module for Perl does not properly handle symlinks.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2011-4116&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;: {&#xA;      &#34;id&#34;: &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29491&#34;,&#xA;      &#34;description&#34;: &#34;ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-29491&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;6.2+20201114-2+deb11u2&#34;&#xA;    },&#xA;    &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-36054&#34;,&#xA;      &#34;description&#34;: &#34;lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-36054&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u4&#34;&#xA;    },&#xA;    &#34;dUTZP+bcDNUqytJV02E1dQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dUTZP+bcDNUqytJV02E1dQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6965&#34;,&#xA;      &#34;description&#34;: &#34;There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6965&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dZ/H1sYv9QSX9VO93tlGLw==&#34;: {&#xA;      &#34;id&#34;: &#34;dZ/H1sYv9QSX9VO93tlGLw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-4xh5-x5gv-qwph&#34;,&#xA;      &#34;description&#34;: &#34;pip&#39;s fallback tar extraction doesn&#39;t check symbolic links point to extraction directory&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-24T15:31:14Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2025-8869 https://github.com/pypa/pip/pull/13550 https://github.com/pypa/pip/commit/f2b92314da012b9fffa36b3f3e67748a37ef464a https://github.com/pypa/pip https://lists.debian.org/debian-lts-announce/2025/10/msg00028.html https://mail.python.org/archives/list/security-announce@python.org/thread/IF5A3GCJY3VH7BVHJKOWOJFKTW7VFQEN https://pip.pypa.io/en/stable/news/#v25-2&#34;,&#xA;      &#34;severity&#34;: &#34;MODERATE&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=25.3&#34;&#xA;    },&#xA;    &#34;eietxU2AL+GdeSQwh6n6XA==&#34;: {&#xA;      &#34;id&#34;: &#34;eietxU2AL+GdeSQwh6n6XA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0215&#34;,&#xA;      &#34;description&#34;: &#34;The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications.  The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash.    This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7.  Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream.  The OpenSSL cms and smime command line applications are similarly affected.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0215&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;epkSU4TSX3BVrueh1mbRzg==&#34;: {&#xA;      &#34;id&#34;: &#34;epkSU4TSX3BVrueh1mbRzg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-13176&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: A timing side-channel which could potentially allow recovering the private key exists in the ECDSA signature computation.  Impact summary: A timing side-channel in ECDSA signature computations could allow recovering the private key by an attacker. However, measuring the timing would require either local access to the signing application or a very fast network connection with low latency.  There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This can happen with significant probability only for some of the supported elliptic curves. In particular the NIST P-521 curve is affected. To be able to measure this leak, the attacker process must either be located in the same physical computer or must have a very fast network connection with low latency. For that reason the severity of this vulnerability is Low.  The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-13176&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u3&#34;&#xA;    },&#xA;    &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;: {&#xA;      &#34;id&#34;: &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6020&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-6020&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pam&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.4.0-9+deb11u2&#34;&#xA;    },&#xA;    &#34;fUdim7gaWpwZtynNz5GiKg==&#34;: {&#xA;      &#34;id&#34;: &#34;fUdim7gaWpwZtynNz5GiKg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0361&#34;,&#xA;      &#34;description&#34;: &#34;A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0361&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u3&#34;&#xA;    },&#xA;    &#34;fXJD4KsFmfzjgWJPYHqTrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;fXJD4KsFmfzjgWJPYHqTrQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-8457&#34;,&#xA;      &#34;description&#34;: &#34;SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2019-8457&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;db5.3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fharKhY7OXyx+gXJAwiegw==&#34;: {&#xA;      &#34;id&#34;: &#34;fharKhY7OXyx+gXJAwiegw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-29088&#34;,&#xA;      &#34;description&#34;: &#34;In SQLite 3.49.0 before 3.49.1, certain argument values to sqlite3_db_config (in the C-language API) can cause a denial of service (application crash). An sz*nBig multiplication is not cast to a 64-bit integer, and consequently some memory allocations may be incorrect.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-29088&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;: {&#xA;      &#34;id&#34;: &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3184&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-3184&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;g44foSnimIkShQZtpEhjbQ==&#34;: {&#xA;      &#34;id&#34;: &#34;g44foSnimIkShQZtpEhjbQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2011-3389&#34;,&#xA;      &#34;description&#34;: &#34;The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \&#34;BEAST\&#34; attack.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2011-3389&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;g9KEtrzigl5TCrpvLCQU5A==&#34;: {&#xA;      &#34;id&#34;: &#34;g9KEtrzigl5TCrpvLCQU5A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69419&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer.  Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service.  The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8_putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, causing write outside of heap allocated buffer.  The vulnerability is reachable via the public PKCS12_get_friendlyname() API when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a different code path that avoids this issue, PKCS12_get_friendlyname() directly invokes the vulnerable function. Exploitation requires an attacker to provide a malicious PKCS#12 file to be parsed by the application and the attacker can just trigger a one zero byte write before the allocated buffer. For that reason the issue was assessed as Low severity according to our Security Policy.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.  OpenSSL 1.0.2 is not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69419&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;gMRlXKqXSfP5n8UiPW430Q==&#34;: {&#xA;      &#34;id&#34;: &#34;gMRlXKqXSfP5n8UiPW430Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33602&#34;,&#xA;      &#34;description&#34;: &#34;nscd: netgroup cache assumes NSS callback uses in-buffer strings  The Name Service Cache Daemon&#39;s (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 when the cache was added to nscd.  This vulnerability is only present in the nscd binary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-33602&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u10&#34;&#xA;    },&#xA;    &#34;h35IL7k4erNtmTSolINnjA==&#34;: {&#xA;      &#34;id&#34;: &#34;h35IL7k4erNtmTSolINnjA==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;ECHO-7db2-03aa-5591&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-03T08:35:22Z&#34;,&#xA;      &#34;links&#34;: &#34;https://advisory.echohq.com/cve/CVE-2026-1703&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=25.2%2Becho.1&#34;&#xA;    },&#xA;    &#34;h7Lhy275V3QLvnBLGAulbw==&#34;: {&#xA;      &#34;id&#34;: &#34;h7Lhy275V3QLvnBLGAulbw==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;PYSEC-2023-62&#34;,&#xA;      &#34;description&#34;: &#34;&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-02T18:15:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pallets/flask/commit/70f906c51ce49c485f1d355703e9cc3386b1cc2b https://github.com/pallets/flask/releases/tag/2.3.2 https://github.com/pallets/flask/releases/tag/2.2.5 https://github.com/pallets/flask/security/advisories/GHSA-m2qf-hxjv-5gpq https://github.com/pallets/flask/commit/afd63b16170b7c047f5758eb910c416511e9c965&#34;,&#xA;      &#34;severity&#34;: &#34;&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;flask&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=2.2.5&#34;&#xA;    },&#xA;    &#34;hb+m0qlWxENYdrb1R811qA==&#34;: {&#xA;      &#34;id&#34;: &#34;hb+m0qlWxENYdrb1R811qA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32776&#34;,&#xA;      &#34;description&#34;: &#34;libexpat before 2.7.5 allows a NULL pointer dereference with empty external parameter entity content.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-32776&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jJNc2KwFwVg03DlaNN1nbA==&#34;: {&#xA;      &#34;id&#34;: &#34;jJNc2KwFwVg03DlaNN1nbA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4806&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4806&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jS/WQ+ua63nFUvjSzoQw1g==&#34;: {&#xA;      &#34;id&#34;: &#34;jS/WQ+ua63nFUvjSzoQw1g==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2236&#34;,&#xA;      &#34;description&#34;: &#34;A timing-based side-channel flaw was found in libgcrypt&#39;s RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-2236&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt20&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;k6VTDL+fxGnbqAk/IPGlnQ==&#34;: {&#xA;      &#34;id&#34;: &#34;k6VTDL+fxGnbqAk/IPGlnQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29383&#34;,&#xA;      &#34;description&#34;: &#34;In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \\n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \\r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that \&#34;cat /etc/passwd\&#34; shows a rogue user account.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-29383&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:4.8.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;k6fjQGJuJ+9NXMFLa5+CgA==&#34;: {&#xA;      &#34;id&#34;: &#34;k6fjQGJuJ+9NXMFLa5+CgA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2016-2781&#34;,&#xA;      &#34;description&#34;: &#34;chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal&#39;s input buffer.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2016-2781&#34;,&#xA;      &#34;severity&#34;: &#34;low&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;k82HOcJqNkts86KJ0glvow==&#34;: {&#xA;      &#34;id&#34;: &#34;k82HOcJqNkts86KJ0glvow==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31484&#34;,&#xA;      &#34;description&#34;: &#34;CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31484&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;5.32.1-4+deb11u4&#34;&#xA;    },&#xA;    &#34;kgqUyyy6Fd5CUNREC3t1jg==&#34;: {&#xA;      &#34;id&#34;: &#34;kgqUyyy6Fd5CUNREC3t1jg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-32988&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure.  This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-32988&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u8&#34;&#xA;    },&#xA;    &#34;khiBNMMi17UID6UagXI8LA==&#34;: {&#xA;      &#34;id&#34;: &#34;khiBNMMi17UID6UagXI8LA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-36086&#34;,&#xA;      &#34;description&#34;: &#34;The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-36086&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;kwKUYCnvi/GndNgicLw/RQ==&#34;: {&#xA;      &#34;id&#34;: &#34;kwKUYCnvi/GndNgicLw/RQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0466&#34;,&#xA;      &#34;description&#34;: &#34;The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification.  As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function.  Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument.  Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0466&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u5&#34;&#xA;    },&#xA;    &#34;kwonOUycdcBenNhjZ1b//Q==&#34;: {&#xA;      &#34;id&#34;: &#34;kwonOUycdcBenNhjZ1b//Q==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-68rp-wp8r-4726&#34;,&#xA;      &#34;description&#34;: &#34;Flask session does not add `Vary: Cookie` header when accessed in some ways&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-19T20:45:41Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pallets/flask/security/advisories/GHSA-68rp-wp8r-4726 https://nvd.nist.gov/vuln/detail/CVE-2026-27205 https://github.com/pallets/flask/commit/089cb86dd22bff589a4eafb7ab8e42dc357623b4 https://github.com/pallets/flask https://github.com/pallets/flask/releases/tag/3.1.3&#34;,&#xA;      &#34;severity&#34;: &#34;LOW&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;flask&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=3.1.3&#34;&#xA;    },&#xA;    &#34;l6iyFrb04z9eZxh35gAtVA==&#34;: {&#xA;      &#34;id&#34;: &#34;l6iyFrb04z9eZxh35gAtVA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-0395&#34;,&#xA;      &#34;description&#34;: &#34;When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-0395&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u12&#34;&#xA;    },&#xA;    &#34;l8HSGkC4gSxCEUDns7KKfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;l8HSGkC4gSxCEUDns7KKfQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2011-3374&#34;,&#xA;      &#34;description&#34;: &#34;It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2011-3374&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;apt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lAYsMZ/1tV9arAE2k+zsAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lAYsMZ/1tV9arAE2k+zsAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-31437&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent \&#34;a reply denying that any of the finding was a security vulnerability.\&#34;&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-31437&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lShmgiPGgmUIO0VwzhSBRA==&#34;: {&#xA;      &#34;id&#34;: &#34;lShmgiPGgmUIO0VwzhSBRA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2650&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow.  Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service.  An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit.  OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods.  When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time.  The time complexity is O(n^2) with &#39;n&#39; being the size of the sub-identifiers in bytes (*).  With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced.  This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms.  Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data.  Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL.  If the use is for the mere purpose of display, the severity is considered low.  In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS.  It also impacts anything that processes X.509 certificates, including simple things like verifying its signature.  The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer&#39;s certificate chain.  Additionally, this only impacts clients, or servers that have explicitly enabled client authentication.  In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates.  This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-2650&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u5&#34;&#xA;    },&#xA;    &#34;lnMcIzRPoETIbrbgdDGINA==&#34;: {&#xA;      &#34;id&#34;: &#34;lnMcIzRPoETIbrbgdDGINA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-46848&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-46848&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1-6&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;4.16.0-2+deb11u1&#34;&#xA;    },&#xA;    &#34;m619DfZfUke+jaTAnoZ2Xw==&#34;: {&#xA;      &#34;id&#34;: &#34;m619DfZfUke+jaTAnoZ2Xw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7008&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-7008&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u6&#34;&#xA;    },&#xA;    &#34;m8d/cgBRVljmHKGy6mUUXw==&#34;: {&#xA;      &#34;id&#34;: &#34;m8d/cgBRVljmHKGy6mUUXw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-40909&#34;,&#xA;      &#34;description&#34;: &#34;Perl threads have a working directory race condition where file operations may target unintended paths.  If a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running.   This may lead to unintended operations such as loading code or accessing files from unexpected locations, which a local attacker may be able to exploit.  The bug was introduced in commit 11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-40909&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;perl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;5.32.1-4+deb11u5&#34;&#xA;    },&#xA;    &#34;mJA9Uto8Hh0tElNp2qoYaA==&#34;: {&#xA;      &#34;id&#34;: &#34;mJA9Uto8Hh0tElNp2qoYaA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-7245&#34;,&#xA;      &#34;description&#34;: &#34;Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-7245&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;meQYB1JR+XE3En/RrDfPvA==&#34;: {&#xA;      &#34;id&#34;: &#34;meQYB1JR+XE3En/RrDfPvA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4415&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-4415&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u2&#34;&#xA;    },&#xA;    &#34;mj6UKCnVoHnC6YBWJGf/Ug==&#34;: {&#xA;      &#34;id&#34;: &#34;mj6UKCnVoHnC6YBWJGf/Ug==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-mq26-g339-26xf&#34;,&#xA;      &#34;description&#34;: &#34;Command Injection in pip when used with Mercurial&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-25T18:32:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://nvd.nist.gov/vuln/detail/CVE-2023-5752 https://github.com/pypa/pip/pull/12306 https://github.com/pypa/pip/commit/389cb799d0da9a840749fcd14878928467ed49b4 https://github.com/pypa/advisory-database/tree/main/vulns/pip/PYSEC-2023-228.yaml https://github.com/pypa/pip https://lists.debian.org/debian-lts-announce/2025/10/msg00028.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/622OZXWG72ISQPLM5Y57YCVIMWHD4C3U https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65UKKF5LBHEFDCUSPBHUN4IHYX7SRMHH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXUVMJM25PUAZRQZBF54OFVKTY3MINPW https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFC2SPFG5FLCZBYY2K3T5MFW2D22NG6E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YBSB3SUPQ3VIFYUMHPO3MEQI4BJAXKCZ https://mail.python.org/archives/list/security-announce@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=23.3&#34;&#xA;    },&#xA;    &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;: {&#xA;      &#34;id&#34;: &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-0563&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \&#34;INPUTRC\&#34; environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-0563&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;n+1p0npJfBZ4vUpG1OFi6w==&#34;: {&#xA;      &#34;id&#34;: &#34;n+1p0npJfBZ4vUpG1OFi6w==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-50868&#34;,&#xA;      &#34;description&#34;: &#34;The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the \&#34;NSEC3\&#34; issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-50868&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u6&#34;&#xA;    },&#xA;    &#34;nApP7wP3SU/Fk79xF589WA==&#34;: {&#xA;      &#34;id&#34;: &#34;nApP7wP3SU/Fk79xF589WA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40226&#34;,&#xA;      &#34;description&#34;: &#34;In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-40226&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u8&#34;&#xA;    },&#xA;    &#34;o75dmeL6883s7llfbkU+PA==&#34;: {&#xA;      &#34;id&#34;: &#34;o75dmeL6883s7llfbkU+PA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-45490&#34;,&#xA;      &#34;description&#34;: &#34;An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-45490&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u6&#34;&#xA;    },&#xA;    &#34;oeIf5WAd0bERBmJCeLsqIg==&#34;: {&#xA;      &#34;id&#34;: &#34;oeIf5WAd0bERBmJCeLsqIg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-7246&#34;,&#xA;      &#34;description&#34;: &#34;Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-7246&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pa+2016jZIT5xycgFHsAsQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pa+2016jZIT5xycgFHsAsQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-20796&#34;,&#xA;      &#34;description&#34;: &#34;In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by &#39;(\\227|)(\\\\1\\\\1|t1|\\\\\\2537)+&#39; in grep.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2018-20796&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pmcR65l6CQ+6Qdh99gUtFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pmcR65l6CQ+6Qdh99gUtFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-52425&#34;,&#xA;      &#34;description&#34;: &#34;libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-52425&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.10-2+deb11u6&#34;&#xA;    },&#xA;    &#34;pu8XvxoOXeKAI0tvpRRucg==&#34;: {&#xA;      &#34;id&#34;: &#34;pu8XvxoOXeKAI0tvpRRucg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-5678&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow.  Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays.  Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.  While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn&#39;t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters.  Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn&#39;t check for an excessively large Q.  An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack.  DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions.  An application calling any of those other functions may similarly be affected.  The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate().  Also vulnerable are the OpenSSL pkey command line application when using the \&#34;-pubcheck\&#34; option, as well as the OpenSSL genpkey command line application.  The OpenSSL SSL/TLS implementation is not affected by this issue.  The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-5678&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;qDLWFSo6NpfxWPhSeAS8zQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qDLWFSo6NpfxWPhSeAS8zQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-28834&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-28834&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls28&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.7.1-5+deb11u6&#34;&#xA;    },&#xA;    &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;: {&#xA;      &#34;id&#34;: &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14104&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-14104&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qhu8cH6U47vSCL4GXDHHtA==&#34;: {&#xA;      &#34;id&#34;: &#34;qhu8cH6U47vSCL4GXDHHtA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4641&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4641&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1:4.8.1-1+deb11u1&#34;&#xA;    },&#xA;    &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;: {&#xA;      &#34;id&#34;: &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69720&#34;,&#xA;      &#34;description&#34;: &#34;The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69720&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;s55QOTlka9E4jTdGv0d/FA==&#34;: {&#xA;      &#34;id&#34;: &#34;s55QOTlka9E4jTdGv0d/FA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4802&#34;,&#xA;      &#34;description&#34;: &#34;Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-4802&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u13&#34;&#xA;    },&#xA;    &#34;srcIw8ffB6famHHqmqImEw==&#34;: {&#xA;      &#34;id&#34;: &#34;srcIw8ffB6famHHqmqImEw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-3817&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Checking excessively long DH keys or parameters may be very slow.  Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service.  The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p.  An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack.  The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check().  Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \&#34;-check\&#34; option.  The OpenSSL SSL/TLS implementation is not affected by this issue.  The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-3817&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1v-0~deb11u1&#34;&#xA;    },&#xA;    &#34;svo9ZP0wOZ7IXZp//n2f7g==&#34;: {&#xA;      &#34;id&#34;: &#34;svo9ZP0wOZ7IXZp//n2f7g==&#34;,&#xA;      &#34;updater&#34;: &#34;osv/pypi&#34;,&#xA;      &#34;name&#34;: &#34;GHSA-m2qf-hxjv-5gpq&#34;,&#xA;      &#34;description&#34;: &#34;Flask vulnerable to possible disclosure of permanent session cookie due to missing Vary: Cookie header&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-01T19:22:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://github.com/pallets/flask/security/advisories/GHSA-m2qf-hxjv-5gpq https://nvd.nist.gov/vuln/detail/CVE-2023-30861 https://github.com/pallets/flask/commit/70f906c51ce49c485f1d355703e9cc3386b1cc2b https://github.com/pallets/flask/commit/afd63b16170b7c047f5758eb910c416511e9c965 https://github.com/pallets/flask https://github.com/pallets/flask/releases/tag/2.2.5 https://github.com/pallets/flask/releases/tag/2.3.2 https://github.com/pypa/advisory-database/tree/main/vulns/flask/PYSEC-2023-62.yaml https://lists.debian.org/debian-lts-announce/2023/08/msg00024.html https://security.netapp.com/advisory/ntap-20230818-0006 https://www.debian.org/security/2023/dsa-5442&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;flask&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;pypi&#34;,&#xA;        &#34;uri&#34;: &#34;https://pypi.org/&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;fixed=2.2.5&#34;&#xA;    },&#xA;    &#34;swQXHeTg1VEUQHser/6eEQ==&#34;: {&#xA;      &#34;id&#34;: &#34;swQXHeTg1VEUQHser/6eEQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-50387&#34;,&#xA;      &#34;description&#34;: &#34;Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the \&#34;KeyTrap\&#34; issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-50387&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u6&#34;&#xA;    },&#xA;    &#34;t3CEDp5fZQ6D+aOizMiuSg==&#34;: {&#xA;      &#34;id&#34;: &#34;t3CEDp5fZQ6D+aOizMiuSg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0286&#34;,&#xA;      &#34;description&#34;: &#34;There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING.  When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-0286&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;tBbOIOCaKVlwik7hH/baMQ==&#34;: {&#xA;      &#34;id&#34;: &#34;tBbOIOCaKVlwik7hH/baMQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-45346&#34;,&#xA;      &#34;description&#34;: &#34;A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2021-45346&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tjx9raP+v/Zzj6SBJct3WA==&#34;: {&#xA;      &#34;id&#34;: &#34;tjx9raP+v/Zzj6SBJct3WA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-7104&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-7104&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;3.34.1-3+deb11u1&#34;&#xA;    },&#xA;    &#34;tne7uZ2E+Ev6QI7ctt3PxA==&#34;: {&#xA;      &#34;id&#34;: &#34;tne7uZ2E+Ev6QI7ctt3PxA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-33600&#34;,&#xA;      &#34;description&#34;: &#34;nscd: Null pointer crashes after notfound response  If the Name Service Cache Daemon&#39;s (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference.  This flaw was introduced in glibc 2.15 when the cache was added to nscd.  This vulnerability is only present in the nscd binary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-33600&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u10&#34;&#xA;    },&#xA;    &#34;u+ya+p/mAtLPAYAgbSPTTw==&#34;: {&#xA;      &#34;id&#34;: &#34;u+ya+p/mAtLPAYAgbSPTTw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41409&#34;,&#xA;      &#34;description&#34;: &#34;Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-41409&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u4BvRhFacDxQuC7pVeExQg==&#34;: {&#xA;      &#34;id&#34;: &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27456&#34;,&#xA;      &#34;description&#34;: &#34;util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-27456&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uEg5UAxE9NNjF71OxdO7uQ==&#34;: {&#xA;      &#34;id&#34;: &#34;uEg5UAxE9NNjF71OxdO7uQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-16231&#34;,&#xA;      &#34;description&#34;: &#34;In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive call. NOTE: third parties dispute the relevance of this report, noting that there are options that can be used to limit the amount of stack that is used&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2017-16231&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uTSYWROavw8Bf2n+4djlMg==&#34;: {&#xA;      &#34;id&#34;: &#34;uTSYWROavw8Bf2n+4djlMg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.  A SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-4598&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;247.3-7+deb11u7&#34;&#xA;    },&#xA;    &#34;ugZgSJOxFzPCX6LQaJzM3A==&#34;: {&#xA;      &#34;id&#34;: &#34;ugZgSJOxFzPCX6LQaJzM3A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-5535&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer.  Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application.  The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists).  This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a \&#34;no overlap\&#34; response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem.  In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur.  This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely.  The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.  Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-5535&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;uspznaGFEzt4cX0xZ36sYw==&#34;: {&#xA;      &#34;id&#34;: &#34;uspznaGFEzt4cX0xZ36sYw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28390&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: During processing of a crafted CMS EnvelopedData message with KeyTransportRecipientInfo a NULL pointer dereference can happen.  Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resulting in Denial of Service.  When a CMS EnvelopedData message that uses KeyTransportRecipientInfo with RSA-OAEP encryption is processed, the optional parameters field of RSA-OAEP SourceFunc algorithm identifier is examined without checking for its presence. This results in a NULL pointer dereference if the field is missing.  Applications and services that call CMS_decrypt() on untrusted input (e.g., S/MIME processing or CMS-based protocols) are vulnerable.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-28390&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uwoSIcSlln9YRd7N1Kc3KQ==&#34;: {&#xA;      &#34;id&#34;: &#34;uwoSIcSlln9YRd7N1Kc3KQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-40228&#34;,&#xA;      &#34;description&#34;: &#34;In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a \&#34;logger -p emerg\&#34; command is executed, if ForwardToWall=yes is set.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-40228&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vcYYj1nbYwczzoLG255iZQ==&#34;: {&#xA;      &#34;id&#34;: &#34;vcYYj1nbYwczzoLG255iZQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4039&#34;,&#xA;      &#34;description&#34;: &#34;**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains  that target AArch64 allows an attacker to exploit an existing buffer  overflow in dynamically-sized local variables in your application  without this being detected. This stack-protector failure only applies  to C99-style dynamically-sized local variables or those created using  alloca(). The stack-protector operates as intended for statically-sized  local variables.  The default behavior when the stack-protector  detects an overflow is to terminate your application, resulting in  controlled loss of availability. An attacker who can exploit a buffer  overflow without triggering the stack-protector might be able to change  program flow control to cause an uncontrolled loss of availability or to  go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4039&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc-9&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vmet9boOEsf+RUsh5rJnEw==&#34;: {&#xA;      &#34;id&#34;: &#34;vmet9boOEsf+RUsh5rJnEw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4741&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations  Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications.  The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use.  The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arrived. In this case calling SSL_free_buffers will succeed even though a record has only been partially processed and the buffer is still in use.  The second scenario occurs where a full record containing application data has been received and processed by OpenSSL but the application has only read part of this data. Again a call to SSL_free_buffers will succeed even though the buffer is still in use.  While these scenarios could occur accidentally during normal operation a malicious attacker could attempt to engineer a stituation where this occurs. We are not aware of this issue being actively exploited.  The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-4741&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;w4Wr213OT8TRxlHAy3MwPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;w4Wr213OT8TRxlHAy3MwPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2010-4756&#34;,&#xA;      &#34;description&#34;: &#34;The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2010-4756&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wFMwqYmfC1KjDKz8vyBr4A==&#34;: {&#xA;      &#34;id&#34;: &#34;wFMwqYmfC1KjDKz8vyBr4A==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4911&#34;,&#xA;      &#34;description&#34;: &#34;A buffer overflow was discovered in the GNU C Library&#39;s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2023-4911&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.31-13+deb11u7&#34;&#xA;    },&#xA;    &#34;wzv81XuYHOFtlrLHaamjZg==&#34;: {&#xA;      &#34;id&#34;: &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-37371&#34;,&#xA;      &#34;description&#34;: &#34;In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-37371&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.18.3-6+deb11u5&#34;&#xA;    },&#xA;    &#34;x3SWTcEL2lgEvouAhmt6fQ==&#34;: {&#xA;      &#34;id&#34;: &#34;x3SWTcEL2lgEvouAhmt6fQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27587&#34;,&#xA;      &#34;description&#34;: &#34;OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable to a Minerva attack, exploitable by measuring the time of signing of random messages using the EVP_DigestSign API, and then using the private key to extract the K value (nonce) from the signatures. Next, based on the bit size of the extracted nonce, one can compare the signing time of full-sized nonces to signatures that used smaller nonces, via statistical tests. There is a side-channel in the P-364 curve that allows private key extraction (also, there is a dependency between the bit size of K and the size of the side channel). NOTE: This CVE is disputed because the OpenSSL security policy explicitly notes that any side channels which require same physical system to be detected are outside of the threat model for the software. The timing signal is so small that it is infeasible to be detected without having the attacking process running on the same physical system.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-27587&#34;,&#xA;      &#34;severity&#34;: &#34;unimportant&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xZI5XEFq7Cuk3Mu3KyTdmg==&#34;: {&#xA;      &#34;id&#34;: &#34;xZI5XEFq7Cuk3Mu3KyTdmg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-56433&#34;,&#xA;      &#34;description&#34;: &#34;shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-56433&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;y2mOh8WlJTCvA6wlULAyvA==&#34;: {&#xA;      &#34;id&#34;: &#34;y2mOh8WlJTCvA6wlULAyvA==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68973&#34;,&#xA;      &#34;description&#34;: &#34;In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-68973&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;2.2.27-2+deb11u3&#34;&#xA;    },&#xA;    &#34;ySGl3ADUS8EeTeweiO86Aw==&#34;: {&#xA;      &#34;id&#34;: &#34;ySGl3ADUS8EeTeweiO86Aw==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-9143&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes.  Impact summary: Out of bound memory writes can lead to an application crash or even a possibility of a remote code execution, however, in all the protocols involving Elliptic Curve Cryptography that we&#39;re aware of, either only \&#34;named curves\&#34; are supported, or, if explicit curve parameters are supported, they specify an X9.62 encoding of binary (GF(2^m)) curves that can&#39;t represent problematic input values. Thus the likelihood of existence of a vulnerable application is low.  In particular, the X9.62 encoding is used for ECC keys in X.509 certificates, so problematic inputs cannot occur in the context of processing X.509 certificates.  Any problematic use-cases would have to be using an \&#34;exotic\&#34; curve encoding.  The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions.  Applications working with \&#34;exotic\&#34; explicit binary (GF(2^m)) curve parameters, that make it possible to represent invalid field polynomials with a zero constant term, via the above or similar APIs, may terminate abruptly as a result of reading or writing outside of array bounds.  Remote code execution cannot easily be ruled out.  The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2024-9143&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u2&#34;&#xA;    },&#xA;    &#34;yyExMMKc3SPW2jNE01wTug==&#34;: {&#xA;      &#34;id&#34;: &#34;yyExMMKc3SPW2jNE01wTug==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file.  Impact summary: An application processing a malformed PKCS#12 file can be caused to dereference an invalid or NULL pointer on memory read, resulting in a Denial of Service.  A type confusion vulnerability exists in PKCS#12 parsing code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid pointer read.  The location is constrained to a 1-byte address space, meaning any attempted pointer manipulation can only target addresses between 0x00 and 0xFF. This range corresponds to the zero page, which is unmapped on most modern operating systems and will reliably result in a crash, leading only to a Denial of Service. Exploiting this issue also requires a user or application to process a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted PKCS#12 files in applications as they are usually used to store private keys which are trusted by definition. For these reasons, the issue was assessed as Low severity.  The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS12 implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.  OpenSSL 1.0.2 is not affected by this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2026-22795&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    },&#xA;    &#34;yyhzQNC9UPFT5NwvhGsvqg==&#34;: {&#xA;      &#34;id&#34;: &#34;yyhzQNC9UPFT5NwvhGsvqg==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-2097&#34;,&#xA;      &#34;description&#34;: &#34;AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn&#39;t written. In the special case of \&#34;in place\&#34; encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-2097&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1n-0+deb11u4&#34;&#xA;    },&#xA;    &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-29458&#34;,&#xA;      &#34;description&#34;: &#34;ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2022-29458&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;6.2+20201114-2+deb11u1&#34;&#xA;    },&#xA;    &#34;ziMZexwNoFxp4mgVOJVBNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ziMZexwNoFxp4mgVOJVBNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;debian/updater&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;      &#34;description&#34;: &#34;Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function.  Impact summary: A NULL pointer dereference can trigger a crash which leads to Denial of Service for an application processing PKCS#12 files.  The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct parameter is NULL before dereferencing it. When called from PKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can be NULL, causing a crash. The vulnerability is limited to Denial of Service and cannot be escalated to achieve code execution or memory disclosure.  Exploiting this issue requires an attacker to provide a malformed PKCS#12 file to an application that processes it. For that reason the issue was assessed as Low severity according to our Security Policy.  The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.  OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.&#34;,&#xA;      &#34;issued&#34;: &#34;0001-01-01T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://security-tracker.debian.org/tracker/CVE-2025-69421&#34;,&#xA;      &#34;severity&#34;: &#34;not yet assigned&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Unknown&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;debian&#34;,&#xA;        &#34;name&#34;: &#34;Debian GNU/Linux&#34;,&#xA;        &#34;version&#34;: &#34;11 (bullseye)&#34;,&#xA;        &#34;version_code_name&#34;: &#34;bullseye&#34;,&#xA;        &#34;version_id&#34;: &#34;11&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;Debian GNU/Linux 11 (bullseye)&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;1.1.1w-0+deb11u5&#34;&#xA;    }&#xA;  },&#xA;  &#34;package_vulnerabilities&#34;: {&#xA;    &#34;+ol9cHiNc+RWiD7Kw3TLCg==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;0jMyX7UCIuSpntMN1r7Ofg==&#34;: [&#xA;      &#34;KwgIGMm765S+zvIBAwM9+g==&#34;&#xA;    ],&#xA;    &#34;2MObxiEVNllmUEzdVZM5qw==&#34;: [&#xA;      &#34;l8HSGkC4gSxCEUDns7KKfQ==&#34;&#xA;    ],&#xA;    &#34;3f992oeEQfSQxRA0nlq8Wg==&#34;: [&#xA;      &#34;DfxJWBpJUY1aHu0ZUSilDg==&#34;,&#xA;      &#34;U3JbUhrT2SqWNuYU5d13cQ==&#34;,&#xA;      &#34;jS/WQ+ua63nFUvjSzoQw1g==&#34;&#xA;    ],&#xA;    &#34;4jCPzhS6OWt4agz9d/cfTw==&#34;: [&#xA;      &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;,&#xA;      &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;&#xA;    ],&#xA;    &#34;7a3yla6TRFZrhmAreU7f8Q==&#34;: [&#xA;      &#34;IvA5abshk33BAuuBar/pVQ==&#34;,&#xA;      &#34;BtqRPc7F47wJWygPNOxw1w==&#34;,&#xA;      &#34;6jg3v7lJ92IZCQpZydR2sA==&#34;,&#xA;      &#34;o75dmeL6883s7llfbkU+PA==&#34;,&#xA;      &#34;IJPGr43VMeLym6tW3EWgdg==&#34;,&#xA;      &#34;DS2nhayHHtinLlFzZheSwg==&#34;,&#xA;      &#34;5Cmp5KJXv+nVwwcs5/Kz7w==&#34;,&#xA;      &#34;hb+m0qlWxENYdrb1R811qA==&#34;,&#xA;      &#34;9ThuL3zLKpmduvKpiDZ60w==&#34;,&#xA;      &#34;UdV1OleGh/0MAkug0ZAlcQ==&#34;,&#xA;      &#34;pmcR65l6CQ+6Qdh99gUtFQ==&#34;,&#xA;      &#34;/7UJLAHsMPxTtTxvuPgrzA==&#34;,&#xA;      &#34;DkvPjH9ZM3anH55rsU+i3w==&#34;,&#xA;      &#34;Ud6njM/DPIrfSPiFct82Lw==&#34;,&#xA;      &#34;5+uzHCKkmvMK8jl2uJkFqQ==&#34;,&#xA;      &#34;KZ3Jt7zkiM272dGLstI4XA==&#34;,&#xA;      &#34;MdrEi+/OrLlW3zDrheID2Q==&#34;&#xA;    ],&#xA;    &#34;8alfBYUr5uWbAyB5PrY8Hg==&#34;: [&#xA;      &#34;uTSYWROavw8Bf2n+4djlMg==&#34;,&#xA;      &#34;5rGwN3bKZLMvxcM/W4jj+A==&#34;,&#xA;      &#34;ASrdm9EROwWp9Ip2w7HH5w==&#34;,&#xA;      &#34;lAYsMZ/1tV9arAE2k+zsAQ==&#34;,&#xA;      &#34;uwoSIcSlln9YRd7N1Kc3KQ==&#34;,&#xA;      &#34;m619DfZfUke+jaTAnoZ2Xw==&#34;,&#xA;      &#34;WG/hQnqUufOh6/5/mlRi/Q==&#34;,&#xA;      &#34;swQXHeTg1VEUQHser/6eEQ==&#34;,&#xA;      &#34;nApP7wP3SU/Fk79xF589WA==&#34;,&#xA;      &#34;U5598afGvRaltva6Rjqnug==&#34;,&#xA;      &#34;n+1p0npJfBZ4vUpG1OFi6w==&#34;,&#xA;      &#34;1dwwvWkARnFe67yAAGVglQ==&#34;,&#xA;      &#34;0q/btA3zBEGWWmFxU7cNig==&#34;,&#xA;      &#34;meQYB1JR+XE3En/RrDfPvA==&#34;,&#xA;      &#34;GRlufCZFwHNK64OQNCFIcg==&#34;,&#xA;      &#34;+x9OyXfXk9PrekfsnPKwlg==&#34;&#xA;    ],&#xA;    &#34;Akbft1KN+9FKNhh1tM25eA==&#34;: [&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;&#xA;    ],&#xA;    &#34;BJL42acLPAR8bEnmM1Z3mg==&#34;: [&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;&#xA;    ],&#xA;    &#34;CBzoMmlXBcyP54HOnauO0g==&#34;: [&#xA;      &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;,&#xA;      &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;&#xA;    ],&#xA;    &#34;D0G6c/ML9XX4eoGHgx1jeQ==&#34;: [&#xA;      &#34;9JIazCQjSvYhpG9KE6d7Pg==&#34;,&#xA;      &#34;ZxTVeoHgmvhWXsV+xLzphA==&#34;,&#xA;      &#34;WHvU12ysgz1Ai1y1KSOiLA==&#34;,&#xA;      &#34;DJOf0vCfrT4GvRr/tBJhbg==&#34;,&#xA;      &#34;Y4A2Zm5xcsipvfluZVH5fA==&#34;,&#xA;      &#34;GezxxUl3QPWUTitg/VHmlQ==&#34;,&#xA;      &#34;jJNc2KwFwVg03DlaNN1nbA==&#34;,&#xA;      &#34;w4Wr213OT8TRxlHAy3MwPQ==&#34;,&#xA;      &#34;tne7uZ2E+Ev6QI7ctt3PxA==&#34;,&#xA;      &#34;pa+2016jZIT5xycgFHsAsQ==&#34;,&#xA;      &#34;l6iyFrb04z9eZxh35gAtVA==&#34;,&#xA;      &#34;gMRlXKqXSfP5n8UiPW430Q==&#34;,&#xA;      &#34;ZdGgPSEZdeQ3XJo0+ZpAXQ==&#34;,&#xA;      &#34;IwuADin5bagOGQErETBgWw==&#34;,&#xA;      &#34;CfS0L/tTata7W0FXXtQ4EQ==&#34;,&#xA;      &#34;MYYkxlB4Ank1zsdIh41apg==&#34;,&#xA;      &#34;c9VxNhSZmjnQmY3rI/q1PA==&#34;,&#xA;      &#34;s55QOTlka9E4jTdGv0d/FA==&#34;,&#xA;      &#34;OTqcMsspao5I6JZMETZ06w==&#34;,&#xA;      &#34;ELw1b1vO2YOtV7qNQijgCw==&#34;,&#xA;      &#34;aqMHDRnPT+3QNU/8tSwsog==&#34;,&#xA;      &#34;T2SiDOPpMK0bU0Y0qkOm1A==&#34;,&#xA;      &#34;wFMwqYmfC1KjDKz8vyBr4A==&#34;,&#xA;      &#34;/YwO4YLRGgF2uWU55V6+MQ==&#34;&#xA;    ],&#xA;    &#34;DtMxcnDA8Je9vAHjmzagaA==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;ExYxXcgoIRjAjUObwDE4jA==&#34;: [&#xA;      &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;,&#xA;      &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;&#xA;    ],&#xA;    &#34;FJIijlwFNqvdoVBcfTF/pg==&#34;: [&#xA;      &#34;WCGqond4znYKCRcm4xyPrg==&#34;,&#xA;      &#34;CtYegggqGbMfg16G/qfITQ==&#34;,&#xA;      &#34;qhu8cH6U47vSCL4GXDHHtA==&#34;,&#xA;      &#34;xZI5XEFq7Cuk3Mu3KyTdmg==&#34;,&#xA;      &#34;LD4zPH3rZZkbSPN5ojHClA==&#34;,&#xA;      &#34;k6VTDL+fxGnbqAk/IPGlnQ==&#34;&#xA;    ],&#xA;    &#34;G/7q+D+DsqYAVnohcyuzgQ==&#34;: [&#xA;      &#34;yyhzQNC9UPFT5NwvhGsvqg==&#34;,&#xA;      &#34;ugZgSJOxFzPCX6LQaJzM3A==&#34;,&#xA;      &#34;g9KEtrzigl5TCrpvLCQU5A==&#34;,&#xA;      &#34;lShmgiPGgmUIO0VwzhSBRA==&#34;,&#xA;      &#34;pu8XvxoOXeKAI0tvpRRucg==&#34;,&#xA;      &#34;+N61/5529gFt7RkD8ooeKQ==&#34;,&#xA;      &#34;Mmh4dm/jzK4QVSJqQVsCDw==&#34;,&#xA;      &#34;vmet9boOEsf+RUsh5rJnEw==&#34;,&#xA;      &#34;ziMZexwNoFxp4mgVOJVBNQ==&#34;,&#xA;      &#34;t3CEDp5fZQ6D+aOizMiuSg==&#34;,&#xA;      &#34;P4mYk7npVU6t91mlbAb8QA==&#34;,&#xA;      &#34;eietxU2AL+GdeSQwh6n6XA==&#34;,&#xA;      &#34;kwKUYCnvi/GndNgicLw/RQ==&#34;,&#xA;      &#34;Mnnh2CmlXNNRCBXvqdG9ig==&#34;,&#xA;      &#34;3Z3QMUqCN4dQV+f8cjn1eA==&#34;,&#xA;      &#34;QEROZuK4q+zt8UbP6ZV8wg==&#34;,&#xA;      &#34;ySGl3ADUS8EeTeweiO86Aw==&#34;,&#xA;      &#34;uspznaGFEzt4cX0xZ36sYw==&#34;,&#xA;      &#34;KLrAiYCJHdmWQ2RaqUywlA==&#34;,&#xA;      &#34;Tcuyjettc5LT9G5wj3mSxw==&#34;,&#xA;      &#34;afNm575eldgXY3DOGUNdqQ==&#34;,&#xA;      &#34;epkSU4TSX3BVrueh1mbRzg==&#34;,&#xA;      &#34;EajCJi704nU1+LqESNMC1w==&#34;,&#xA;      &#34;b2D8D2g8yPwuRhswdqF0Rw==&#34;,&#xA;      &#34;3QDeWfKuntq5YxjjCuZXRQ==&#34;,&#xA;      &#34;bX7iB3AnaRh9Z+itWa3Xyw==&#34;,&#xA;      &#34;srcIw8ffB6famHHqmqImEw==&#34;,&#xA;      &#34;yyExMMKc3SPW2jNE01wTug==&#34;,&#xA;      &#34;cZD87tDO2q60EFy3BAZ33g==&#34;,&#xA;      &#34;x3SWTcEL2lgEvouAhmt6fQ==&#34;,&#xA;      &#34;GmBi7n85v8sX6ItoMSgvlQ==&#34;,&#xA;      &#34;bjAyJcmSN59FnAeiA6RMIg==&#34;&#xA;    ],&#xA;    &#34;Gm6VA87iOnaQ0rWR6oO9eA==&#34;: [&#xA;      &#34;u+ya+p/mAtLPAYAgbSPTTw==&#34;&#xA;    ],&#xA;    &#34;IQfQp74RcAWE7jHtQsMLHg==&#34;: [&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;&#xA;    ],&#xA;    &#34;LOfpAnA/2f7zE4SFJCrxVg==&#34;: [&#xA;      &#34;5OqCQlhu6kV+tAsgGEGuwQ==&#34;,&#xA;      &#34;Mxv06g47iCk7QIqi7Xbojw==&#34;&#xA;    ],&#xA;    &#34;MvKvHHnD0jaLaWpyHvkhgQ==&#34;: [&#xA;      &#34;WCGqond4znYKCRcm4xyPrg==&#34;,&#xA;      &#34;CtYegggqGbMfg16G/qfITQ==&#34;,&#xA;      &#34;qhu8cH6U47vSCL4GXDHHtA==&#34;,&#xA;      &#34;xZI5XEFq7Cuk3Mu3KyTdmg==&#34;,&#xA;      &#34;LD4zPH3rZZkbSPN5ojHClA==&#34;,&#xA;      &#34;k6VTDL+fxGnbqAk/IPGlnQ==&#34;&#xA;    ],&#xA;    &#34;NzkVb7F31E+Vxxz3PCS6tg==&#34;: [&#xA;      &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;,&#xA;      &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;&#xA;    ],&#xA;    &#34;PgPY5hWnihXRN45byvzY0g==&#34;: [&#xA;      &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;,&#xA;      &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;&#xA;    ],&#xA;    &#34;R1TkRM71ql+JWgz0VF5ESQ==&#34;: [&#xA;      &#34;1U/zi3CEao+52y8LKU0uvw==&#34;,&#xA;      &#34;bZ2m6J3EIvmTdjYJprlOKA==&#34;,&#xA;      &#34;khiBNMMi17UID6UagXI8LA==&#34;,&#xA;      &#34;CaLsKNvkpKlxKVBlUnje9Q==&#34;&#xA;    ],&#xA;    &#34;RAMuXEdVU4AJ/z4aiK/NNg==&#34;: [&#xA;      &#34;bNvH54V1y9cXsGaCXVwFVw==&#34;,&#xA;      &#34;QGq5D5QwQKPerzYOBVoSsg==&#34;,&#xA;      &#34;Jl0PQIP9L3ufSvQ2j71iww==&#34;,&#xA;      &#34;Qd2XnJZ3qaQ3AbyDXUaR2A==&#34;,&#xA;      &#34;Pj9V3uC2c9o+P6lTpzzGeA==&#34;&#xA;    ],&#xA;    &#34;RYsqO4ROpGMzzCO5WaTrlw==&#34;: [&#xA;      &#34;aWm6E1ULjtuw0ydmFnsI4A==&#34;&#xA;    ],&#xA;    &#34;RgdwX+VC70nXZ2E527PXaA==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;VbNyM3GfR5vEmJdFAiKqrA==&#34;: [&#xA;      &#34;vcYYj1nbYwczzoLG255iZQ==&#34;&#xA;    ],&#xA;    &#34;Wi4oa03apqVdR6okNeZiNA==&#34;: [&#xA;      &#34;KaoEuixR8E5nnpGZ1pG25w==&#34;,&#xA;      &#34;kgqUyyy6Fd5CUNREC3t1jg==&#34;,&#xA;      &#34;SNR1VT02i1HBHxqGRTeBAQ==&#34;,&#xA;      &#34;9sNDKQtqg7Z3gJr//JQlvg==&#34;,&#xA;      &#34;HuTBrVHKx7uaMtQjiqifKQ==&#34;,&#xA;      &#34;3cBlPR7Tm4BIC/+wflldAg==&#34;,&#xA;      &#34;bBymk1eoEM+tVYB+/Crz+g==&#34;,&#xA;      &#34;ZbWtFXr0WyByV4kCb3M6FA==&#34;,&#xA;      &#34;XtT5+z5+yMbpdsyfkLItzA==&#34;,&#xA;      &#34;Y++3+aMTeU3vX7BI4/zG6w==&#34;,&#xA;      &#34;fUdim7gaWpwZtynNz5GiKg==&#34;,&#xA;      &#34;qDLWFSo6NpfxWPhSeAS8zQ==&#34;,&#xA;      &#34;g44foSnimIkShQZtpEhjbQ==&#34;&#xA;    ],&#xA;    &#34;ZWeYh81MRCu1nh3mOyptIA==&#34;: [&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;&#xA;    ],&#xA;    &#34;bGWj1aSf0wvrecU/pdTv5A==&#34;: [&#xA;      &#34;08pa4udz9bnA9IOsE208DA==&#34;&#xA;    ],&#xA;    &#34;bHkSxcl6e1quNxLGb6uX8A==&#34;: [&#xA;      &#34;QopvyNp/5Ata9NdAUhFygw==&#34;,&#xA;      &#34;k6fjQGJuJ+9NXMFLa5+CgA==&#34;,&#xA;      &#34;Xce4H7xsVfrtYV2aXED7xA==&#34;&#xA;    ],&#xA;    &#34;bTSLWiizipO2axtmvXFuVg==&#34;: [&#xA;      &#34;YXTNVVKQsWY/LFuomB715g==&#34;,&#xA;      &#34;lnMcIzRPoETIbrbgdDGINA==&#34;,&#xA;      &#34;6j23t/n6B77cQMxfCeLKzA==&#34;&#xA;    ],&#xA;    &#34;brvvAQ6V7yp7QbUuk+W5Hg==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;d4b/e0nx+/vPWuPB7oDzPw==&#34;: [&#xA;      &#34;9JIazCQjSvYhpG9KE6d7Pg==&#34;,&#xA;      &#34;ZxTVeoHgmvhWXsV+xLzphA==&#34;,&#xA;      &#34;WHvU12ysgz1Ai1y1KSOiLA==&#34;,&#xA;      &#34;DJOf0vCfrT4GvRr/tBJhbg==&#34;,&#xA;      &#34;Y4A2Zm5xcsipvfluZVH5fA==&#34;,&#xA;      &#34;GezxxUl3QPWUTitg/VHmlQ==&#34;,&#xA;      &#34;jJNc2KwFwVg03DlaNN1nbA==&#34;,&#xA;      &#34;w4Wr213OT8TRxlHAy3MwPQ==&#34;,&#xA;      &#34;tne7uZ2E+Ev6QI7ctt3PxA==&#34;,&#xA;      &#34;pa+2016jZIT5xycgFHsAsQ==&#34;,&#xA;      &#34;l6iyFrb04z9eZxh35gAtVA==&#34;,&#xA;      &#34;gMRlXKqXSfP5n8UiPW430Q==&#34;,&#xA;      &#34;ZdGgPSEZdeQ3XJo0+ZpAXQ==&#34;,&#xA;      &#34;IwuADin5bagOGQErETBgWw==&#34;,&#xA;      &#34;CfS0L/tTata7W0FXXtQ4EQ==&#34;,&#xA;      &#34;MYYkxlB4Ank1zsdIh41apg==&#34;,&#xA;      &#34;c9VxNhSZmjnQmY3rI/q1PA==&#34;,&#xA;      &#34;s55QOTlka9E4jTdGv0d/FA==&#34;,&#xA;      &#34;OTqcMsspao5I6JZMETZ06w==&#34;,&#xA;      &#34;ELw1b1vO2YOtV7qNQijgCw==&#34;,&#xA;      &#34;aqMHDRnPT+3QNU/8tSwsog==&#34;,&#xA;      &#34;T2SiDOPpMK0bU0Y0qkOm1A==&#34;,&#xA;      &#34;wFMwqYmfC1KjDKz8vyBr4A==&#34;,&#xA;      &#34;/YwO4YLRGgF2uWU55V6+MQ==&#34;&#xA;    ],&#xA;    &#34;dUT53gagQO5Ac9Bdlu5dAw==&#34;: [&#xA;      &#34;NYWveHKKsIYIKl+vE8UEhw==&#34;&#xA;    ],&#xA;    &#34;dXglURzzdbLnOf14mab1Hg==&#34;: [&#xA;      &#34;EYo03ICovWfCjw2cKpwx4Q==&#34;,&#xA;      &#34;VzolVkOS5HseGzVTLzDMfA==&#34;,&#xA;      &#34;9xk1p07t4ZV999E3HyfhVA==&#34;,&#xA;      &#34;27BVJE6xR0Z84LzifDnFYA==&#34;,&#xA;      &#34;WWnQMI7f7f75SgC9Dcl+QQ==&#34;&#xA;    ],&#xA;    &#34;dobmrwm7aq9puvFHwNgXxw==&#34;: [&#xA;      &#34;08pa4udz9bnA9IOsE208DA==&#34;&#xA;    ],&#xA;    &#34;dv3AlW8tBL4D0mEPW7/Z2Q==&#34;: [&#xA;      &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;,&#xA;      &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;&#xA;    ],&#xA;    &#34;eF2QIdrTmJlWmjQTkhntow==&#34;: [&#xA;      &#34;5IA1PesIyj05J2Yx0YB4tQ==&#34;&#xA;    ],&#xA;    &#34;elSR7m8uLWd/kMl2jxTm/A==&#34;: [&#xA;      &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;,&#xA;      &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;&#xA;    ],&#xA;    &#34;evNF5YpSAxyFV7iWv3lSVw==&#34;: [&#xA;      &#34;yyhzQNC9UPFT5NwvhGsvqg==&#34;,&#xA;      &#34;ugZgSJOxFzPCX6LQaJzM3A==&#34;,&#xA;      &#34;g9KEtrzigl5TCrpvLCQU5A==&#34;,&#xA;      &#34;lShmgiPGgmUIO0VwzhSBRA==&#34;,&#xA;      &#34;pu8XvxoOXeKAI0tvpRRucg==&#34;,&#xA;      &#34;+N61/5529gFt7RkD8ooeKQ==&#34;,&#xA;      &#34;Mmh4dm/jzK4QVSJqQVsCDw==&#34;,&#xA;      &#34;vmet9boOEsf+RUsh5rJnEw==&#34;,&#xA;      &#34;ziMZexwNoFxp4mgVOJVBNQ==&#34;,&#xA;      &#34;t3CEDp5fZQ6D+aOizMiuSg==&#34;,&#xA;      &#34;P4mYk7npVU6t91mlbAb8QA==&#34;,&#xA;      &#34;eietxU2AL+GdeSQwh6n6XA==&#34;,&#xA;      &#34;kwKUYCnvi/GndNgicLw/RQ==&#34;,&#xA;      &#34;Mnnh2CmlXNNRCBXvqdG9ig==&#34;,&#xA;      &#34;3Z3QMUqCN4dQV+f8cjn1eA==&#34;,&#xA;      &#34;QEROZuK4q+zt8UbP6ZV8wg==&#34;,&#xA;      &#34;ySGl3ADUS8EeTeweiO86Aw==&#34;,&#xA;      &#34;uspznaGFEzt4cX0xZ36sYw==&#34;,&#xA;      &#34;KLrAiYCJHdmWQ2RaqUywlA==&#34;,&#xA;      &#34;Tcuyjettc5LT9G5wj3mSxw==&#34;,&#xA;      &#34;afNm575eldgXY3DOGUNdqQ==&#34;,&#xA;      &#34;epkSU4TSX3BVrueh1mbRzg==&#34;,&#xA;      &#34;EajCJi704nU1+LqESNMC1w==&#34;,&#xA;      &#34;b2D8D2g8yPwuRhswdqF0Rw==&#34;,&#xA;      &#34;3QDeWfKuntq5YxjjCuZXRQ==&#34;,&#xA;      &#34;bX7iB3AnaRh9Z+itWa3Xyw==&#34;,&#xA;      &#34;srcIw8ffB6famHHqmqImEw==&#34;,&#xA;      &#34;yyExMMKc3SPW2jNE01wTug==&#34;,&#xA;      &#34;cZD87tDO2q60EFy3BAZ33g==&#34;,&#xA;      &#34;x3SWTcEL2lgEvouAhmt6fQ==&#34;,&#xA;      &#34;GmBi7n85v8sX6ItoMSgvlQ==&#34;,&#xA;      &#34;bjAyJcmSN59FnAeiA6RMIg==&#34;&#xA;    ],&#xA;    &#34;fCmdLCR2Ix0ldnZL1Fa52A==&#34;: [&#xA;      &#34;MXRm//dBCnWFem5zffvqmA==&#34;,&#xA;      &#34;MDmWztEMrTY+VyVp5c+Fvw==&#34;&#xA;    ],&#xA;    &#34;hdNUjYIlrdEAtBWAggakAw==&#34;: [&#xA;      &#34;brAAPyN4siIQT5bxa9xu4g==&#34;,&#xA;      &#34;7DtFnnE8FjIpCQKunutpeg==&#34;,&#xA;      &#34;m8d/cgBRVljmHKGy6mUUXw==&#34;,&#xA;      &#34;ce9B0jxjyNiCfG4VtZhnVw==&#34;,&#xA;      &#34;k82HOcJqNkts86KJ0glvow==&#34;,&#xA;      &#34;AvPdNumiwGnBie+lo1du3A==&#34;&#xA;    ],&#xA;    &#34;iWqdRZmp08/Tx22qEtmjJg==&#34;: [&#xA;      &#34;mJA9Uto8Hh0tElNp2qoYaA==&#34;,&#xA;      &#34;oeIf5WAd0bERBmJCeLsqIg==&#34;,&#xA;      &#34;ZrZi02myDWWW0L5oPQj/cg==&#34;,&#xA;      &#34;uEg5UAxE9NNjF71OxdO7uQ==&#34;,&#xA;      &#34;G45dR+E8Wb+bEhCdwuqUDg==&#34;&#xA;    ],&#xA;    &#34;jErhz6PtXvAy/EPWJ425rA==&#34;: [&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;&#xA;    ],&#xA;    &#34;jKa8Us2cqGejhOc2/n5DDA==&#34;: [&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;&#xA;    ],&#xA;    &#34;kq4lGEwi4agkgAJAkDs9Ng==&#34;: [&#xA;      &#34;kwonOUycdcBenNhjZ1b//Q==&#34;,&#xA;      &#34;svo9ZP0wOZ7IXZp//n2f7g==&#34;,&#xA;      &#34;h7Lhy275V3QLvnBLGAulbw==&#34;&#xA;    ],&#xA;    &#34;krch6TQqNWzRi5F/dDkF+Q==&#34;: [&#xA;      &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;,&#xA;      &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;&#xA;    ],&#xA;    &#34;l5lCPjtOmPM8/LLh9+NjeQ==&#34;: [&#xA;      &#34;WxlxRC1KqAo8Mejv03fZGA==&#34;,&#xA;      &#34;ANq7+l7+5U6IDt9eU02u5w==&#34;,&#xA;      &#34;y2mOh8WlJTCvA6wlULAyvA==&#34;,&#xA;      &#34;F0zkrLGlbsix59P9mqoAOg==&#34;&#xA;    ],&#xA;    &#34;lCjIskl1HulEHShaXtgmwQ==&#34;: [&#xA;      &#34;d1D8ilhRqv7A6eAzRE4Ojw==&#34;,&#xA;      &#34;qx22MhFBEwd9c5PrW7vjKw==&#34;,&#xA;      &#34;EvarhwbaAMrD3meGYFByGg==&#34;,&#xA;      &#34;TgHh5yPuwUnIt8v9WawGYw==&#34;,&#xA;      &#34;zL8eGifGE7B+wAjTOBjRgQ==&#34;&#xA;    ],&#xA;    &#34;nwapLKtbHTjy1u8+aA0X+Q==&#34;: [&#xA;      &#34;h35IL7k4erNtmTSolINnjA==&#34;,&#xA;      &#34;TN8d5UGyH2D+dtBNYjKyKg==&#34;,&#xA;      &#34;dZ/H1sYv9QSX9VO93tlGLw==&#34;,&#xA;      &#34;PUY4fn57nsAU2qBLtgRtdw==&#34;,&#xA;      &#34;mj6UKCnVoHnC6YBWJGf/Ug==&#34;,&#xA;      &#34;WcYPrwv9PSVoVoof5MRsxQ==&#34;&#xA;    ],&#xA;    &#34;pZoLgWqHDgjhYQPevrtwdg==&#34;: [&#xA;      &#34;GPLYq884jQKVksfMc+b7OQ==&#34;&#xA;    ],&#xA;    &#34;qN2BSWBeEFRJnExMNJ1S0A==&#34;: [&#xA;      &#34;fharKhY7OXyx+gXJAwiegw==&#34;,&#xA;      &#34;DRKFIYYNzLumACBV1CW/rw==&#34;,&#xA;      &#34;dUTZP+bcDNUqytJV02E1dQ==&#34;,&#xA;      &#34;tjx9raP+v/Zzj6SBJct3WA==&#34;,&#xA;      &#34;BxMnseA9J6OW2RWxSrlbyQ==&#34;,&#xA;      &#34;tBbOIOCaKVlwik7hH/baMQ==&#34;,&#xA;      &#34;1VnWeA5AZgybyD8+PiXyiw==&#34;&#xA;    ],&#xA;    &#34;qrPZzwjmppjOiQbrGk5IQA==&#34;: [&#xA;      &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;,&#xA;      &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;&#xA;    ],&#xA;    &#34;s66OGd0F2Pbemhmyrg2R9w==&#34;: [&#xA;      &#34;uTSYWROavw8Bf2n+4djlMg==&#34;,&#xA;      &#34;5rGwN3bKZLMvxcM/W4jj+A==&#34;,&#xA;      &#34;ASrdm9EROwWp9Ip2w7HH5w==&#34;,&#xA;      &#34;lAYsMZ/1tV9arAE2k+zsAQ==&#34;,&#xA;      &#34;uwoSIcSlln9YRd7N1Kc3KQ==&#34;,&#xA;      &#34;m619DfZfUke+jaTAnoZ2Xw==&#34;,&#xA;      &#34;WG/hQnqUufOh6/5/mlRi/Q==&#34;,&#xA;      &#34;swQXHeTg1VEUQHser/6eEQ==&#34;,&#xA;      &#34;nApP7wP3SU/Fk79xF589WA==&#34;,&#xA;      &#34;U5598afGvRaltva6Rjqnug==&#34;,&#xA;      &#34;n+1p0npJfBZ4vUpG1OFi6w==&#34;,&#xA;      &#34;1dwwvWkARnFe67yAAGVglQ==&#34;,&#xA;      &#34;0q/btA3zBEGWWmFxU7cNig==&#34;,&#xA;      &#34;meQYB1JR+XE3En/RrDfPvA==&#34;,&#xA;      &#34;GRlufCZFwHNK64OQNCFIcg==&#34;,&#xA;      &#34;+x9OyXfXk9PrekfsnPKwlg==&#34;&#xA;    ],&#xA;    &#34;tNSJ6slY9zv+TZ6de2MVDQ==&#34;: [&#xA;      &#34;B78vSIll2muNDyY3F7urzw==&#34;&#xA;    ],&#xA;    &#34;tYADP/V07/lE8Qno1R/hhg==&#34;: [&#xA;      &#34;08pa4udz9bnA9IOsE208DA==&#34;&#xA;    ],&#xA;    &#34;vqKK+x/7cGHNjLr4L7x4uQ==&#34;: [&#xA;      &#34;fXJD4KsFmfzjgWJPYHqTrQ==&#34;&#xA;    ],&#xA;    &#34;wkuBBC4B84P3b4K0fGF0OQ==&#34;: [&#xA;      &#34;PJI8cpGpF5+qVan9H5W87Q==&#34;,&#xA;      &#34;fkr6aZMLVO7g6mTdU91lcg==&#34;,&#xA;      &#34;qICU5RK5Z4CLAC7/kEZ48Q==&#34;,&#xA;      &#34;u4BvRhFacDxQuC7pVeExQg==&#34;,&#xA;      &#34;mnGTl6DWEAI0reOCEqb0jw==&#34;&#xA;    ],&#xA;    &#34;yYcMjCGhY/mc+KraTEHSJg==&#34;: [&#xA;      &#34;T4I8pNAq5VIHzHdHBx3kMA==&#34;,&#xA;      &#34;0H/7BkE/Q7YVSZhEABXg6w==&#34;,&#xA;      &#34;wzv81XuYHOFtlrLHaamjZg==&#34;,&#xA;      &#34;59rfj7X7Q9O1jyg5L5a5zQ==&#34;,&#xA;      &#34;Nzgd66Rt/zG5Z8ZfbjecYA==&#34;,&#xA;      &#34;OB48XTRaksNPWPm0dVHJmQ==&#34;,&#xA;      &#34;cHpKoxiUOXPYUJX1ihMLDg==&#34;,&#xA;      &#34;dFbvYO8avXWxbjXnm5ACqQ==&#34;&#xA;    ],&#xA;    &#34;zV4ikAKeqBYFSvXnkFMYgg==&#34;: [&#xA;      &#34;f6s0c0I4Eo7U1vb/8R9ATg==&#34;,&#xA;      &#34;Ns8JH9Yqo6xZiGzihN4B3g==&#34;,&#xA;      &#34;KvTZOL1MGCoBHaXdBx1RcA==&#34;,&#xA;      &#34;Ba+eHoq0U7aq9Kxwg98r8Q==&#34;&#xA;    ],&#xA;    &#34;zw9OGAXs3mWkBkmfKzbfqg==&#34;: [&#xA;      &#34;l8HSGkC4gSxCEUDns7KKfQ==&#34;&#xA;    ]&#xA;  },&#xA;  &#34;enrichments&#34;: {}&#xA;}&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-clair-scan-pod | container step-oci-attach-report: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu&#xA;Attaching clair-report-amd64.json to quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37&#xA;Executing: oras attach --no-tty --format go-template={{.digest}} --registry-config /home/oras/auth.json --artifact-type application/vnd.redhat.clair-report+json quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37 clair-report-amd64.json:application/vnd.redhat.clair-report+json&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-clair-scan-pod | container step-conftest-vulnerabilities: &#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/tekton/home/clair-result-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 7,&#xA;&#x9;&#x9;&#34;warnings&#34;: [&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched medium vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: coreutils-8.32-4+b1 (CVE-2016-2781)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_medium_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 1&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libsmartcols1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), gpgv-2.2.27-2+deb11u2 (CVE-2022-3219), libsystemd0-247.3-7+deb11u1 (CVE-2013-4392, CVE-2020-13529, CVE-2023-31437, CVE-2023-31438, CVE-2023-31439), perl-base-5.32.1-4+deb11u2 (CVE-2011-4116, CVE-2023-31486), tar-1.34+dfsg-1 (CVE-2005-2541, TEMP-0290435-0B57B5), libpcre3-2:8.39-13 (CVE-2017-11164, CVE-2017-16231, CVE-2017-7245, CVE-2017-7246, CVE-2019-20838), libgssapi-krb5-2-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), libgcc-s1-10.2.1-6 (CVE-2023-4039), coreutils-8.32-4+b1 (CVE-2017-18018, CVE-2025-5278), libmount1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libc6-2.31-13+deb11u5 (CVE-2010-4756, CVE-2018-20796, CVE-2019-1010022, CVE-2019-1010023, CVE-2019-1010024, CVE-2019-1010025, CVE-2019-9192), libstdc++6-10.2.1-6 (CVE-2023-4039), sysvinit-utils-2.96-7+deb11u1 (TEMP-0517018-A83CE6), libkrb5support0-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), gcc-9-base-9.3.0-22 (CVE-2023-4039), libexpat1-2.2.10-2+deb11u5 (CVE-2013-0340, CVE-2023-52426, CVE-2024-28757), libpcre2-8-0-10.36-2+deb11u1 (CVE-2022-41409), libapt-pkg6.0-2.2.4 (CVE-2011-3374), util-linux-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), mount-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), openssl-1.1.1n-0+deb11u3 (CVE-2025-27587), libudev1-247.3-7+deb11u1 (CVE-2013-4392, CVE-2020-13529, CVE-2023-31437, CVE-2023-31438, CVE-2023-31439), libk5crypto3-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), libssl1.1-1.1.1n-0+deb11u3 (CVE-2025-27587), apt-2.2.4 (CVE-2011-3374), libblkid1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libc-bin-2.31-13+deb11u5 (CVE-2010-4756, CVE-2018-20796, CVE-2019-1010022, CVE-2019-1010023, CVE-2019-1010024, CVE-2019-1010025, CVE-2019-9192), gcc-10-base-10.2.1-6 (CVE-2023-4039), libgcrypt20-1.8.7-6 (CVE-2018-6829, CVE-2024-2236), passwd-1:4.8.1-1 (CVE-2007-5686, CVE-2013-4235, TEMP-0628843-DBAD28), libuuid1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libgnutls30-3.7.1-5+deb11u2 (CVE-2011-3389), bsdutils-1:2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libsqlite3-0-3.34.1-3 (CVE-2021-45346, CVE-2022-35737, CVE-2025-29088, CVE-2025-70873), libkrb5-3-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), login-1:4.8.1-1 (CVE-2007-5686, CVE-2013-4235, TEMP-0628843-DBAD28), bash-5.1-2+deb11u1 (TEMP-0841856-B18BAF)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_low_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 89&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched unknown vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libsmartcols1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), gpgv-2.2.27-2+deb11u2 (CVE-2025-30258, CVE-2025-68972), libsystemd0-247.3-7+deb11u1 (CVE-2026-40228), ncurses-base-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), libpam-modules-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), zlib1g-1:1.2.11.dfsg-2+deb11u2 (CVE-2023-45853, CVE-2026-27171), libpam-runtime-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), tar-1.34+dfsg-1 (CVE-2026-5704), libtinfo6-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), libmount1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), liblzma5-5.2.5-2.1~deb11u1 (CVE-2026-34743), libc6-2.31-13+deb11u5 (CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-8058, CVE-2026-0861, CVE-2026-0915, CVE-2026-4046, CVE-2026-4437, CVE-2026-4438), ncurses-bin-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), libexpat1-2.2.10-2+deb11u5 (CVE-2024-8176, CVE-2025-59375, CVE-2025-66382, CVE-2026-24515, CVE-2026-25210, CVE-2026-32776, CVE-2026-32777, CVE-2026-32778, CVE-2026-41080), util-linux-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), mount-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), openssl-1.1.1n-0+deb11u3 (CVE-2026-28387, CVE-2026-28388, CVE-2026-28389, CVE-2026-28390, CVE-2026-31789), libudev1-247.3-7+deb11u1 (CVE-2026-40228), libssl1.1-1.1.1n-0+deb11u3 (CVE-2026-28387, CVE-2026-28388, CVE-2026-28389, CVE-2026-28390, CVE-2026-31789), libblkid1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libpam-modules-bin-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), libc-bin-2.31-13+deb11u5 (CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-8058, CVE-2026-0861, CVE-2026-0915, CVE-2026-4046, CVE-2026-4437, CVE-2026-4438), libgcrypt20-1.8.7-6 (CVE-2021-33560), dpkg-1.20.12 (CVE-2025-6297), passwd-1:4.8.1-1 (CVE-2024-56433), libuuid1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libdb5.3-5.3.28+dfsg1-0.8 (CVE-2019-8457), libpam0g-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), libtasn1-6-4.16.0-2 (CVE-2025-13151), bsdutils-1:2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libzstd1-1.4.8+dfsg-2.1 (CVE-2022-4899), libncursesw6-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), libsqlite3-0-3.34.1-3 (CVE-2025-6965), login-1:4.8.1-1 (CVE-2024-56433), bash-5.1-2+deb11u1 (CVE-2022-3715)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_unknown_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 88&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;]&#xA;&#x9;}&#xA;]&#xA;{&#34;vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:0,&#34;medium&#34;:0,&#34;low&#34;:0,&#34;unknown&#34;:0},&#34;unpatched_vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:0,&#34;medium&#34;:1,&#34;low&#34;:89,&#34;unknown&#34;:88}}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#34;, &#34;digests&#34;: [&#34;sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37&#34;]}}&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:59:58+00:00&#34;,&#34;note&#34;:&#34;Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-clamav-scan-pod | init container: prepare&#xA;2026/04/19 13:55:04 Entrypoint initialization&#xA;&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-clamav-scan-pod | init container: place-scripts&#xA;2026/04/19 13:55:05 Decoded script /tekton/scripts/script-0-hh6p2&#xA;2026/04/19 13:55:05 Decoded script /tekton/scripts/script-1-6rck2&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-clamav-scan-pod | container step-extract-and-scan-image: &#xA;Starting clamd ...&#xA;clamd is ready!&#xA;Detecting artifact type for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37.&#xA;Detected container image. Processing image manifests.&#xA;Running &#34;oc image extract&#34; on image of arch amd64&#xA;Scanning image for arch amd64. This operation may take a while.&#xA;&#xA;----------- SCAN SUMMARY -----------&#xA;Infected files: 0&#xA;Time: 38.355 sec (0 m 38 s)&#xA;Start Date: 2026:04:19 13:57:05&#xA;End Date:   2026:04:19 13:57:43&#xA;Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27975/Sat Apr 18 06:26:10 2026 Database version: 27975&#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 2&#xA;&#x9;}&#xA;]&#xA;{&#34;timestamp&#34;:&#34;1776607063&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1776607063&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1776607063&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#34;, &#34;digests&#34;: [&#34;sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37&#34;]}}&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-clamav-scan-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90@sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;Preparing clamscan-result-amd64.log&#xA;Preparing clamscan-ec-test-amd64.json&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading 841ea7f5385d clamscan-result-amd64.log&#xA;Uploading 6440c9173c93 clamscan-ec-test-amd64.json&#xA;Uploaded  6440c9173c93 clamscan-ec-test-amd64.json&#xA;Uploaded  841ea7f5385d clamscan-result-amd64.log&#xA;Uploading b5d5e434603e application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  b5d5e434603e application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90@sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37&#xA;Digest: sha256:b5d5e434603eb0e3e21f5b0cf16868c1e2c762f07584b00767c8cfc1cdcdf54c&#xA;&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-clone-repository-pod | init container: prepare&#xA;2026/04/19 13:52:44 Entrypoint initialization&#xA;&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-clone-repository-pod | init container: place-scripts&#xA;2026/04/19 13:52:44 Decoded script /tekton/scripts/script-0-m5xch&#xA;2026/04/19 13:52:44 Decoded script /tekton/scripts/script-1-xmvkg&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-clone-repository-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1776606769.0196686,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1776606769.262471,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/devfile-sample-python-basic @ d981b3febb34efc636b69c342ae5be53aa224b90 (grafted, HEAD) in path /var/workdir/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1776606769.2625225,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1776606769.290624,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /var/workdir/source&#34;}&#xA;Merge option disabled. Using checked-out revision d981b3febb34efc636b69c342ae5be53aa224b90 directly.&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-clone-repository-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-clone-repository-pod | container step-create-trusted-artifact: &#xA;Prepared artifact from /var/workdir/source (sha256:e5afa59a44d24608a15038d8e22d40e4f32f8c7e339720c865fd307e60d65abf)&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu&#xA;Executing: oras push --annotation=quay.expires-after=6h --registry-config /tmp/create-oci.sh.WI2Gv9/auth-eDAYz7.json quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90.git SOURCE_ARTIFACT&#xA;Uploading e5afa59a44d2 SOURCE_ARTIFACT&#xA;Uploaded  e5afa59a44d2 SOURCE_ARTIFACT&#xA;Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90.git&#xA;ArtifactType: application/vnd.unknown.artifact.v1&#xA;Digest: sha256:030f8422a44a930ea206f1310d81ce01c648187b642b8dd4464b859079db94a7&#xA;Artifacts created&#xA;&#xA;&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-init-pod | init container: prepare&#xA;2026/04/19 13:52:36 Entrypoint initialization&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-init-pod | container step-init: &#xA;time=&#34;2026-04-19T13:52:40Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-19T13:52:40Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-19T13:52:40Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-19T13:52:40Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-19T13:52:40Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-19T13:52:40Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-19T13:52:41Z&#34; level=info msg=&#34;Cache proxy is disabled in param or in backend&#34;&#xA;time=&#34;2026-04-19T13:52:41Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-19T13:52:41Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-prefetch-dependencies-pod | init container: prepare&#xA;2026/04/19 13:52:54 Entrypoint initialization&#xA;&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-prefetch-dependencies-pod | init container: place-scripts&#xA;2026/04/19 13:52:55 Decoded script /tekton/scripts/script-0-zp5jc&#xA;2026/04/19 13:52:55 Decoded script /tekton/scripts/script-2-4lp4s&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-prefetch-dependencies-pod | container step-skip-ta: &#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-prefetch-dependencies-pod | container step-use-trusted-artifact: &#xA;WARN: found skip file in /var/workdir/source&#xA;&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-prefetch-dependencies-pod | container step-prefetch-dependencies: &#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;time=&#34;2026-04-19T13:53:18Z&#34; level=debug msg=&#34;Starting prefetch-dependencies&#34;&#xA;time=&#34;2026-04-19T13:53:18Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-19T13:53:18Z&#34; level=info msg=&#34;Not using package registry proxy because allow-package-registry-proxy is not set to `true` on the cluster level&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-04-19T13:53:18Z&#34; level=info msg=&#34;[param] source-dir: /var/workdir/source&#34;&#xA;time=&#34;2026-04-19T13:53:18Z&#34; level=info msg=&#34;[param] output-dir: /var/workdir/cachi2/output&#34;&#xA;time=&#34;2026-04-19T13:53:18Z&#34; level=info msg=&#34;[param] sbom-format: spdx&#34;&#xA;time=&#34;2026-04-19T13:53:18Z&#34; level=info msg=&#34;[param] mode: strict&#34;&#xA;time=&#34;2026-04-19T13:53:18Z&#34; level=info msg=&#34;[param] output-dir-mount-point: /cachi2/output&#34;&#xA;time=&#34;2026-04-19T13:53:18Z&#34; level=info msg=&#34;[param] env-files: [/var/workdir/cachi2/cachi2.env]&#34;&#xA;time=&#34;2026-04-19T13:53:18Z&#34; level=info msg=&#34;[param] git-auth-directory: /workspace/git-basic-auth&#34;&#xA;time=&#34;2026-04-19T13:53:19Z&#34; level=info msg=&#34;hermeto [stdout] hermeto 0.50.1&#34; logger=CliExecutor&#xA;time=&#34;2026-04-19T13:53:19Z&#34; level=warning msg=&#34;No input provided; skipping prefetch-dependencies&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-04-19T13:53:19Z&#34; level=debug msg=&#34;Finished prefetch-dependencies&#34;&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-prefetch-dependencies-pod | container step-create-trusted-artifact: &#xA;WARN: found skip file in /var/workdir/source&#xA;WARN: found skip file in /var/workdir/cachi2&#xA;&#xA;&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-push-dockerfile-pod | init container: prepare&#xA;2026/04/19 13:55:01 Entrypoint initialization&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-push-dockerfile-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.3AijH8/auth-wq31kN.json quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:e5afa59a44d24608a15038d8e22d40e4f32f8c7e339720c865fd307e60d65abf --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:e5afa59a44d24608a15038d8e22d40e4f32f8c7e339720c865fd307e60d65abf to /var/workdir/source&#xA;&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-push-dockerfile-pod | container step-push: &#xA;time=&#34;2026-04-19T13:55:12Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#34;&#xA;time=&#34;2026-04-19T13:55:12Z&#34; level=info msg=&#34;[param] image-digest: sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37&#34;&#xA;time=&#34;2026-04-19T13:55:12Z&#34; level=info msg=&#34;[param] containerfile: docker/Dockerfile&#34;&#xA;time=&#34;2026-04-19T13:55:12Z&#34; level=info msg=&#34;[param] context: .&#34;&#xA;time=&#34;2026-04-19T13:55:12Z&#34; level=info msg=&#34;[param] tag-suffix: .dockerfile&#34;&#xA;time=&#34;2026-04-19T13:55:12Z&#34; level=info msg=&#34;[param] artifact-type: application/vnd.konflux.dockerfile&#34;&#xA;time=&#34;2026-04-19T13:55:12Z&#34; level=info msg=&#34;[param] source: source&#34;&#xA;time=&#34;2026-04-19T13:55:12Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-04-19T13:55:12Z&#34; level=info msg=&#34;[param] alternative-filename: Dockerfile&#34;&#xA;time=&#34;2026-04-19T13:55:13Z&#34; level=info msg=&#34;oras [stdout] quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:2d58de03839ce2aae03ba36f44753d4ffe05ea0499a0e960b117579a549af180&#34; logger=CliExecutor&#xA;time=&#34;2026-04-19T13:55:13Z&#34; level=info msg=&#34;Containerfile &#39;/var/workdir/source/docker/Dockerfile&#39; is pushed to registry with tag: sha256-707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37.dockerfile&#34;&#xA;{&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:2d58de03839ce2aae03ba36f44753d4ffe05ea0499a0e960b117579a549af180&#34;}&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-sast-shell-check-pod | init container: prepare&#xA;2026/04/19 13:55:04 Entrypoint initialization&#xA;&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-sast-shell-check-pod | init container: place-scripts&#xA;2026/04/19 13:55:05 Decoded script /tekton/scripts/script-1-xxj8h&#xA;2026/04/19 13:55:05 Decoded script /tekton/scripts/script-2-2f6zp&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-sast-shell-check-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.C8NRnT/auth-Ehb6WZ.json quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:e5afa59a44d24608a15038d8e22d40e4f32f8c7e339720c865fd307e60d65abf --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:e5afa59a44d24608a15038d8e22d40e4f32f8c7e339720c865fd307e60d65abf to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-sast-shell-check-pod | container step-sast-shell-check: &#xA;+ source /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=test-comp-yssu&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: test-comp-yssu&#39;&#xA;INFO: The PROJECT_NAME used is: test-comp-yssu&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;++ rpm -q --queryformat &#39;%{NAME}-%{VERSION}-%{RELEASE}\n&#39; ShellCheck&#xA;+ PACKAGE_VERSION=ShellCheck-0.10.0-3.el9&#xA;+ OUTPUT_FILE=shellcheck-results.json&#xA;+ SOURCE_CODE_DIR=/var/workdir/source&#xA;+ declare -a ALL_TARGETS&#xA;+ IFS=,&#xA;+ read -ra TARGET_ARRAY&#xA;+ for d in &#34;${TARGET_ARRAY[@]}&#34;&#xA;+ potential_path=/var/workdir/source/.&#xA;++ realpath -m /var/workdir/source/.&#xA;+ resolved_path=/var/workdir/source&#xA;+ [[ /var/workdir/source == \/\v\a\r\/\w\o\r\k\d\i\r\/\s\o\u\r\c\e* ]]&#xA;+ ALL_TARGETS+=(&#34;$resolved_path&#34;)&#xA;+ &#39;[&#39; -z &#39;&#39; &#39;]&#39;&#xA;+ &#39;[&#39; -r /sys/fs/cgroup/cpu.max &#39;]&#39;&#xA;+ read -r quota period&#xA;+ &#39;[&#39; 800000 &#39;!=&#39; max &#39;]&#39;&#xA;+ &#39;[&#39; -n 100000 &#39;]&#39;&#xA;+ &#39;[&#39; 100000 -gt 0 &#39;]&#39;&#xA;+ export SC_JOBS=8&#xA;+ SC_JOBS=8&#xA;INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh&#xA;+ echo &#39;INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh&#39;&#xA;+ /usr/share/csmock/scripts/run-shellcheck.sh /var/workdir/source&#xA;Looking for shell scripts................ done&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/applypatch-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/post-update.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/prepare-commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-applypatch.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-merge-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-push.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-rebase.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-receive.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/push-to-checkout.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/sendemail-validate.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/update.sample&#xA;+ CSGREP_OPTS=(--mode=json --strip-path-prefix=&#34;$SOURCE_CODE_DIR&#34;/ --remove-duplicates --embed-context=3 --set-scan-prop=&#34;ShellCheck:${PACKAGE_VERSION}&#34;)&#xA;+ [[ true == \t\r\u\e ]]&#xA;+ CSGREP_EVENT_FILTER=&#39;\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2218|2224|2225|2242|2256|2258|2261)\]$&#39;&#xA;+ CSGREP_OPTS+=(--event=&#34;$CSGREP_EVENT_FILTER&#34;)&#xA;+ csgrep --mode=json --strip-path-prefix=/var/workdir/source/ --remove-duplicates --embed-context=3 --set-scan-prop=ShellCheck:ShellCheck-0.10.0-3.el9 &#39;--event=\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|2218|2224|2225|2242|2256|2258|2261)\]$&#39; ./shellcheck-results/empty.json ./shellcheck-results/sc-103.json ./shellcheck-results/sc-113.json ./shellcheck-results/sc-117.json ./shellcheck-results/sc-120.json ./shellcheck-results/sc-70.json ./shellcheck-results/sc-73.json ./shellcheck-results/sc-74.json ./shellcheck-results/sc-76.json ./shellcheck-results/sc-79.json ./shellcheck-results/sc-82.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... + echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;+ curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;ShellCheck results have been saved to shellcheck-results.json&#xA;+ echo &#39;ShellCheck results have been saved to shellcheck-results.json&#39;&#xA;+ csgrep --mode=evtstat shellcheck-results.json&#xA;+ csgrep --mode=sarif shellcheck-results.json&#xA;+ TEST_OUTPUT=&#xA;+ parse_test_output sast-shell-check-oci-ta sarif shellcheck-results.sarif&#xA;+ TEST_NAME=sast-shell-check-oci-ta&#xA;+ TEST_RESULT_FORMAT=sarif&#xA;+ TEST_RESULT_FILE=shellcheck-results.sarif&#xA;+ &#39;[&#39; -z sast-shell-check-oci-ta &#39;]&#39;&#xA;+ &#39;[&#39; -z sarif &#39;]&#39;&#xA;+ &#39;[&#39; -z shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; &#39;!&#39; -f shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; sarif = sarif &#39;]&#39;&#xA;+++ jq -rce &#39;(if (.runs[].results | length &gt; 0) then &#34;FAILURE&#34; else &#34;SUCCESS&#34; end)&#39; shellcheck-results.sarif&#xA;+++ jq -rce &#39;(.runs[].results | length)&#39; shellcheck-results.sarif&#xA;++ make_result_json -r SUCCESS -f 0&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ FAILURES=0&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-04-19T13:56:53+00:00 --arg result SUCCESS --arg note &#39;For details, check Tekton task log.&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:53+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:53+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ TEST_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:53+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:53+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ jq .failures&#xA;+ &#39;[&#39; 0 -gt 0 &#39;]&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:53+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:53+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-sast-shell-check-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90@sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37 shellcheck-results.sarif:application/sarif+json&#xA;Preparing shellcheck-results.sarif&#xA;Uploading 3b606a9dd3a1 shellcheck-results.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploaded  3b606a9dd3a1 shellcheck-results.sarif&#xA;Uploading 8b6402a9f8ca application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  8b6402a9f8ca application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90@sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37&#xA;Digest: sha256:8b6402a9f8ca606ed138265d916ada39550cc6cc3b56b9213dd707a608bbcff1&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-sast-unicode-check-pod | init container: prepare&#xA;2026/04/19 13:55:00 Entrypoint initialization&#xA;&#xA; pod: test-comp-yssu-on-pull-request-tfdwd-sast-unicode-check-pod | init container: place-scripts&#xA;2026/04/19 13:55:00 Decoded script /tekton/scripts/script-1-f25j9&#xA;2026/04/19 13:55:00 Decoded script /tekton/scripts/script-2-t4gn6&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-sast-unicode-check-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.nvLm1Z/auth-E2Usaz.json quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:e5afa59a44d24608a15038d8e22d40e4f32f8c7e339720c865fd307e60d65abf --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu@sha256:e5afa59a44d24608a15038d8e22d40e4f32f8c7e339720c865fd307e60d65abf to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-sast-unicode-check-pod | container step-sast-unicode-check: &#xA;+ . /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;INFO: The PROJECT_NAME used is: test-comp-yssu&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=test-comp-yssu&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: test-comp-yssu&#39;&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;+ SCAN_PROP=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58&#xA;+ FUC_EXIT_CODE=0&#xA;+ LANG=en_US.utf8&#xA;+ find_unicode_control.py -p bidi -v -d -t /var/workdir/source&#xA;+ [[ 0 -ne 0 ]]&#xA;+ sed -i raw_sast_unicode_check_out.txt -E -e &#39;s|(.*:[0-9]+)(.*)|\1: warning:\2|&#39; -e &#39;s|^|Error: UNICONTROL_WARNING:\n|&#39;&#xA;+ CSGERP_OPTS=(--mode=json --remove-duplicates --embed-context=3 --set-scan-prop=&#34;${SCAN_PROP}&#34; --strip-path-prefix=&#34;${SOURCE_CODE_DIR}&#34;/source/)&#xA;+ csgrep --mode=json --remove-duplicates --embed-context=3 --set-scan-prop=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58 --strip-path-prefix=/var/workdir/source/ raw_sast_unicode_check_out.txt&#xA;+ csgrep --mode=evtstat processed_sast_unicode_check_out.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;+ echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... + curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;+ mv processed_sast_unicode_check_out.json sast_unicode_check_out.json&#xA;+ csgrep --mode=sarif sast_unicode_check_out.json&#xA;+ [[ 0 -eq 0 ]]&#xA;+ note=&#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39;&#xA;++ make_result_json -r SUCCESS -t &#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39;&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ NOTE=&#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39;&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-04-19T13:55:47+00:00 --arg result SUCCESS --arg note &#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:55:47+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:55:47+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ ERROR_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:55:47+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:55:47+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:55:47+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: test-comp-yssu-on-pull-request-tfdwd-sast-unicode-check-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90@sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37 sast_unicode_check_out.sarif:application/sarif+json&#xA;Preparing sast_unicode_check_out.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading 1da9b99b8b41 sast_unicode_check_out.sarif&#xA;Uploaded  1da9b99b8b41 sast_unicode_check_out.sarif&#xA;Uploading 13095bc0d2e1 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  13095bc0d2e1 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90@sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37&#xA;Digest: sha256:13095bc0d2e1aefd9bb4d960411221a4589ab81517a03b4b8909b6bdf1d84a32&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: test-comp-yssu-on-pull-requf42331553f29cbc37069447770eae8bc-pod | init container: prepare&#xA;2026/04/19 13:56:58 Entrypoint initialization&#xA;&#xA; pod: test-comp-yssu-on-pull-requf42331553f29cbc37069447770eae8bc-pod | init container: place-scripts&#xA;2026/04/19 13:56:59 Decoded script /tekton/scripts/script-0-lqppq&#xA;2026/04/19 13:56:59 Decoded script /tekton/scripts/script-1-prxwk&#xA;2026/04/19 13:56:59 Decoded script /tekton/scripts/script-2-pc6bk&#xA;2026/04/19 13:56:59 Decoded script /tekton/scripts/script-3-b9wvf&#xA;2026/04/19 13:56:59 Decoded script /tekton/scripts/script-4-9fcjs&#xA;2026/04/19 13:56:59 Decoded script /tekton/scripts/script-5-fq4dm&#xA;&#xA;pod: test-comp-yssu-on-pull-requf42331553f29cbc37069447770eae8bc-pod | container step-introspect: &#xA;Artifact type will be determined by introspection.&#xA;Checking the media type of the OCI artifact...&#xA;[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#xA;The media type of the OCI artifact is application/vnd.oci.image.manifest.v1+json.&#xA;Looking for image labels that indicate this might be an operator bundle...&#xA;[retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#xA;Found 0 matching labels.&#xA;Expecting 3 or more to identify this image as an operator bundle.&#xA;Introspection concludes that this artifact is of type &#34;application&#34;.&#xA;&#xA;pod: test-comp-yssu-on-pull-requf42331553f29cbc37069447770eae8bc-pod | container step-generate-container-auth: &#xA;Selecting auth for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu&#xA;Auth json written to &#34;/auth/auth.json&#34;.&#xA;&#xA;pod: test-comp-yssu-on-pull-requf42331553f29cbc37069447770eae8bc-pod | container step-set-skip-for-bundles: &#xA;2026/04/19 13:57:04 INFO Step was skipped due to when expressions were evaluated to false.&#xA;&#xA;pod: test-comp-yssu-on-pull-requf42331553f29cbc37069447770eae8bc-pod | container step-app-check: &#xA;time=&#34;2026-04-19T13:57:04Z&#34; level=info msg=&#34;certification library version&#34; version=&#34;1.17.1 &lt;commit: f7de82ae1c76e6c10ea94967d6b6a66f96248cbe&gt;&#34;&#xA;time=&#34;2026-04-19T13:57:05Z&#34; level=info msg=&#34;running checks for quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90 for platform amd64&#34;&#xA;time=&#34;2026-04-19T13:57:05Z&#34; level=info msg=&#34;target image&#34; image=&#34;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#34;&#xA;time=&#34;2026-04-19T13:57:09Z&#34; level=error msg=&#34;could not get rpm list, continuing without it&#34; error=&#34;could not find rpm db/packages: stat /tmp/preflight-888752448/fs/usr/lib/sysimage/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-888752448/fs/var/lib/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-888752448/fs/var/lib/rpm/Packages: no such file or directory&#34;&#xA;time=&#34;2026-04-19T13:57:09Z&#34; level=info msg=&#34;warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-888752448/fs/licenses: no such file or directory&#34; check=HasLicense&#xA;time=&#34;2026-04-19T13:57:09Z&#34; level=info msg=&#34;check completed&#34; check=HasLicense result=FAILED&#xA;time=&#34;2026-04-19T13:57:09Z&#34; level=info msg=&#34;check completed&#34; check=HasUniqueTag result=PASSED&#xA;time=&#34;2026-04-19T13:57:09Z&#34; level=info msg=&#34;check completed&#34; check=LayerCountAcceptable result=PASSED&#xA;time=&#34;2026-04-19T13:57:09Z&#34; level=info msg=&#34;check completed&#34; check=HasNoProhibitedPackages err=&#34;unable to get a list of all packages in the image: could not get rpm list: could not find rpm db/packages: stat /tmp/preflight-888752448/fs/usr/lib/sysimage/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-888752448/fs/var/lib/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-888752448/fs/var/lib/rpm/Packages: no such file or directory&#34; result=ERROR&#xA;time=&#34;2026-04-19T13:57:09Z&#34; level=info msg=&#34;check completed&#34; check=HasRequiredLabel result=FAILED&#xA;time=&#34;2026-04-19T13:57:09Z&#34; level=info msg=&#34;detected empty USER. Presumed to be running as root&#34; check=RunAsNonRoot&#xA;time=&#34;2026-04-19T13:57:09Z&#34; level=info msg=&#34;USER value must be provided and be a non-root value for this check to pass&#34; check=RunAsNonRoot&#xA;time=&#34;2026-04-19T13:57:09Z&#34; level=info msg=&#34;check completed&#34; check=RunAsNonRoot result=FAILED&#xA;time=&#34;2026-04-19T13:57:12Z&#34; level=info msg=&#34;check completed&#34; check=HasModifiedFiles result=PASSED&#xA;time=&#34;2026-04-19T13:57:13Z&#34; level=info msg=&#34;check completed&#34; check=BasedOnUbi result=FAILED&#xA;time=&#34;2026-04-19T13:57:13Z&#34; level=info msg=&#34;This image&#39;s tag on-pr-d981b3febb34efc636b69c342ae5be53aa224b90 will be paired with digest sha256:707fe2d1b91e82dce021bea30fc8af5a2e2be21f3a62422b184d4c8e47306d37 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.&#34;&#xA;{&#xA;    &#34;image&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#34;,&#xA;    &#34;passed&#34;: false,&#xA;    &#34;test_library&#34;: {&#xA;        &#34;name&#34;: &#34;github.com/redhat-openshift-ecosystem/openshift-preflight&#34;,&#xA;        &#34;version&#34;: &#34;1.17.1&#34;,&#xA;        &#34;commit&#34;: &#34;f7de82ae1c76e6c10ea94967d6b6a66f96248cbe&#34;&#xA;    },&#xA;    &#34;results&#34;: {&#xA;        &#34;passed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasUniqueTag&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has a tag other than &#39;latest&#39;, so that the image can be uniquely identified.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;LayerCountAcceptable&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasModifiedFiles&#34;,&#xA;                &#34;elapsed_time&#34;: 3782,&#xA;                &#34;description&#34;: &#34;Checks that no files installed via RPM in the base Red Hat layer have been modified&#34;&#xA;            }&#xA;        ],&#xA;        &#34;failed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasLicense&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses&#34;,&#xA;                &#34;help&#34;: &#34;Check HasLicense encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasRequiredLabel&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata&#34;,&#xA;                &#34;help&#34;: &#34;Check HasRequiredLabel encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Add the following labels to your Dockerfile or Containerfile: name, vendor, version, release, summary, description, maintainer.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;RunAsNonRoot&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication&#34;,&#xA;                &#34;help&#34;: &#34;Check RunAsNonRoot encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Indicate a specific USER in the dockerfile or containerfile&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;BasedOnUbi&#34;,&#xA;                &#34;elapsed_time&#34;: 115,&#xA;                &#34;description&#34;: &#34;Checking if the container&#39;s base image is based upon the Red Hat Universal Base Image (UBI)&#34;,&#xA;                &#34;help&#34;: &#34;Check BasedOnUbi encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Change the FROM directive in your Dockerfile or Containerfile, for the latest list of images and details refer to: https://catalog.redhat.com/software/base-images&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            }&#xA;        ],&#xA;        &#34;errors&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasNoProhibitedPackages&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.&#34;,&#xA;                &#34;help&#34;: &#34;Check HasNoProhibitedPackages encountered an error. Please review the preflight.log file for more information.&#34;&#xA;            }&#xA;        ]&#xA;    }&#xA;}&#xA;time=&#34;2026-04-19T13:57:13Z&#34; level=info msg=&#34;Preflight result: FAILED&#34;&#xA;&#xA;pod: test-comp-yssu-on-pull-requf42331553f29cbc37069447770eae8bc-pod | container step-app-set-outcome: &#xA;{&#34;result&#34;:&#34;ERROR&#34;,&#34;timestamp&#34;:&#34;1776607033&#34;,&#34;note&#34;:&#34;Task preflight is a ERROR: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:3,&#34;failures&#34;:4,&#34;warnings&#34;:0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-kzwe/test-comp-yssu:on-pr-d981b3febb34efc636b69c342ae5be53aa224b90&#xA;&#xA;pod: test-comp-yssu-on-pull-requf42331553f29cbc37069447770eae8bc-pod | container step-final-outcome: &#xA;+ [[ ! -f /mount/konflux.results.json ]]&#xA;+ tee /tekton/steps/step-final-outcome/results/test-output&#xA;{&#34;result&#34;:&#34;ERROR&#34;,&#34;timestamp&#34;:&#34;1776607033&#34;,&#34;note&#34;:&#34;Task preflight is a ERROR: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:3,&#34;failures&#34;:4,&#34;warnings&#34;:0}New PipelineRun test-comp-yssu-on-pull-request-dl46g found after retrigger for component build-e2e-kzwe/test-comp-yssu&#xA;PipelineRun test-comp-yssu-on-pull-request-dl46g found for Component build-e2e-kzwe/test-comp-yssu&#xA;PipelineRun test-comp-yssu-on-pull-request-dl46g reason: ResolvingTaskRef&#xA;PipelineRun test-comp-yssu-on-pull-request-dl46g reason: Running&#xA;PipelineRun test-comp-yssu-on-pull-request-dl46g reason: Running&#xA;PipelineRun test-comp-yssu-on-pull-request-dl46g reason: Running&#xA;PipelineRun test-comp-yssu-on-pull-request-dl46g reason: Running&#xA;PipelineRun test-comp-yssu-on-pull-request-dl46g reason: Running&#xA;PipelineRun test-comp-yssu-on-pull-request-dl46g reason: Running&#xA;PipelineRun test-comp-yssu-on-pull-request-dl46g reason: Running&#xA;PipelineRun test-comp-yssu-on-pull-request-dl46g reason: Completed&#xA;&lt; Exit [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:356 @ 04/19/26 14:07:57.329 (2m56.218s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:07:57.329&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:07:57.329 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) should push Dockerfile to registry [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="4.001753324">
              <system-err>&gt; Enter [It] should push Dockerfile to registry - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:366 @ 04/19/26 14:07:57.33&#xA;&lt; Exit [It] should push Dockerfile to registry - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:366 @ 04/19/26 14:08:01.331 (4.001s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:08:01.332&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:08:01.332 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) floating tags are created successfully [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.000391017">
              <skipped message="skipped - floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic"></skipped>
              <system-err>&gt; Enter [It] floating tags are created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:378 @ 04/19/26 14:08:01.332&#xA;[SKIPPED] floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:380 @ 04/19/26 14:08:01.332&#xA;&lt; Exit [It] floating tags are created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:378 @ 04/19/26 14:08:01.332 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:08:01.332&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:08:01.332 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) image manifest mediaType is correct [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.321901377">
              <system-err>&gt; Enter [It] image manifest mediaType is correct - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:395 @ 04/19/26 14:08:01.333&#xA;&lt; Exit [It] image manifest mediaType is correct - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:395 @ 04/19/26 14:08:01.654 (322ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:08:01.655&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:08:01.655 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) check for source images if enabled in pipeline [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.019604037">
              <skipped message="skipped - Skipping source image check since it is not enabled in the pipeline"></skipped>
              <system-err>&gt; Enter [It] check for source images if enabled in pipeline - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:420 @ 04/19/26 14:08:01.655&#xA;Source build is enabled: false&#xA;[SKIPPED] Skipping source image check since it is not enabled in the pipeline&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:440 @ 04/19/26 14:08:01.674&#xA;&lt; Exit [It] check for source images if enabled in pipeline - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:420 @ 04/19/26 14:08:01.674 (19ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:08:01.675&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:08:01.675 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta should have Pipeline Records [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="0.174893515">
              <system-err>&gt; Enter [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:477 @ 04/19/26 14:08:01.675&#xA;&lt; Exit [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:477 @ 04/19/26 14:08:01.77 (95ms)&#xA;&gt; Enter [It] should have Pipeline Records - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:498 @ 04/19/26 14:08:01.771&#xA;records for PipelineRun test-comp-yssu-on-pull-request-dl46g:&#xA;&amp;{[{build-e2e-kzwe/results/e9e93110-25fd-424b-baa6-27b5e76fe4d0/records/6dd7ae19-1d7f-4991-be26-bb6094935d27 0225e839-49b5-4212-b0c8-399c1a8931b7 0225e839-49b5-4212-b0c8-399c1a8931b7} {build-e2e-kzwe/results/e9e93110-25fd-424b-baa6-27b5e76fe4d0/records/c6b62e44-7c8e-4c0b-8ab6-989c8b404720 14b739a3-59f2-4ce1-858f-728f751236ac 14b739a3-59f2-4ce1-858f-728f751236ac} {build-e2e-kzwe/results/e9e93110-25fd-424b-baa6-27b5e76fe4d0/records/d20075d6-a48f-4bf7-9ed1-355d6c0081f3 227a4549-5bd8-40a7-8459-f370fa64270e 227a4549-5bd8-40a7-8459-f370fa64270e} {build-e2e-kzwe/results/e9e93110-25fd-424b-baa6-27b5e76fe4d0/records/8c3dc504-764b-4544-b1e8-58c60e0ba280 22da7ea6-036c-4e85-86d0-fab01f94aee2 22da7ea6-036c-4e85-86d0-fab01f94aee2} {build-e2e-kzwe/results/e9e93110-25fd-424b-baa6-27b5e76fe4d0/records/f0819b27-d015-4b9f-bbe8-80f0a02e738d 2a4415b1-c691-443f-9f58-0d3e0c67dc6a 2a4415b1-c691-443f-9f58-0d3e0c67dc6a} {build-e2e-kzwe/results/e9e93110-25fd-424b-baa6-27b5e76fe4d0/records/37e3b80d-9e88-405d-9381-8396897e7a8b 3e806c35-2315-4aba-b84c-fefe58af871a 3e806c35-2315-4aba-b84c-fefe58af871a} {build-e2e-kzwe/results/e9e93110-25fd-424b-baa6-27b5e76fe4d0/records/22840626-ed49-4fb5-907f-9a36262f3a3a 7279775f-9545-45da-89f7-4ced1c503d55 7279775f-9545-45da-89f7-4ced1c503d55} {build-e2e-kzwe/results/e9e93110-25fd-424b-baa6-27b5e76fe4d0/records/e9e93110-25fd-424b-baa6-27b5e76fe4d0 8b6cb7f3-ac57-402d-bf95-84bbbe92ce57 8b6cb7f3-ac57-402d-bf95-84bbbe92ce57} {build-e2e-kzwe/results/e9e93110-25fd-424b-baa6-27b5e76fe4d0/records/20923876-c8d1-412c-9386-5c614797d629 9249bfaa-a223-4ad4-ba94-24cec63874ed 9249bfaa-a223-4ad4-ba94-24cec63874ed} {build-e2e-kzwe/results/e9e93110-25fd-424b-baa6-27b5e76fe4d0/records/b94825f1-1587-4b77-847e-80454138b359 93956346-166b-4a89-8b03-57b09d81d9e3 93956346-166b-4a89-8b03-57b09d81d9e3} {build-e2e-kzwe/results/e9e93110-25fd-424b-baa6-27b5e76fe4d0/records/f32676e5-90f9-43ed-a54a-3e75caff078c 9c934e9f-70a1-4eba-a51d-ff0698285ed6 9c934e9f-70a1-4eba-a51d-ff0698285ed6} {build-e2e-kzwe/results/e9e93110-25fd-424b-baa6-27b5e76fe4d0/records/ed23037d-974b-4988-a102-5114f4825aa8 a1d130ca-12b7-4a2f-97f9-e26ef9a3ab5b a1d130ca-12b7-4a2f-97f9-e26ef9a3ab5b} {build-e2e-kzwe/results/e9e93110-25fd-424b-baa6-27b5e76fe4d0/records/5cde2ee3-5f31-463c-bdde-123f13e21061 e2e0cf95-19fd-486b-b764-2214d6caefc8 e2e0cf95-19fd-486b-b764-2214d6caefc8} {build-e2e-kzwe/results/e9e93110-25fd-424b-baa6-27b5e76fe4d0/records/6f1fdc5c-ab49-477c-8265-4c11e0a9bd04 f25fed59-e007-40f9-a31f-52a675dd2a8b f25fed59-e007-40f9-a31f-52a675dd2a8b} {build-e2e-kzwe/results/e9e93110-25fd-424b-baa6-27b5e76fe4d0/records/e3c2d0e9-09dd-4400-a4b3-9409b09fdd02 f7badb03-6b6f-4722-af1f-16592a3f7d36 f7badb03-6b6f-4722-af1f-16592a3f7d36}]}&#xA;&lt; Exit [It] should have Pipeline Records - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:498 @ 04/19/26 14:08:01.85 (79ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:08:01.85&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:08:01.85 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta should have Pipeline Logs [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.175113389">
              <system-err>&gt; Enter [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:540 @ 04/19/26 14:08:01.851&#xA;&lt; Exit [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:540 @ 04/19/26 14:08:02.026 (174ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:08:02.026&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:08:02.026 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry verify-enterprise-contract check should pass [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry should have Hermeto content in the SBOM in case the build was hermetic [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.023149053">
              <skipped message="skipped - Hermetic build is not enabled, skipping the test"></skipped>
              <system-err>&gt; Enter [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:550 @ 04/19/26 14:08:02.027&#xA;&lt; Exit [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:550 @ 04/19/26 14:08:02.05 (22ms)&#xA;&gt; Enter [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:661 @ 04/19/26 14:08:02.05&#xA;[SKIPPED] Hermetic build is not enabled, skipping the test&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:663 @ 04/19/26 14:08:02.05&#xA;&lt; Exit [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:661 @ 04/19/26 14:08:02.05 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:08:02.05&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:08:02.05 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) build-definitions ec pipelines runs ec pipeline pipelines/enterprise-contract.yaml [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines pipelineRun should fail for symlink component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-fbve [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="10.285300157">
              <system-err>&gt; Enter [It] pipelineRun should fail for symlink component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-fbve - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:816 @ 04/19/26 14:08:02.051&#xA;PipelineRun test-symlink-comp-fbve-on-pull-request-6s69w found for Component build-e2e-kzwe/test-symlink-comp-fbve&#xA;PipelineRun test-symlink-comp-fbve-on-pull-request-6s69w reason: Failed&#xA;attempt 1/1: PipelineRun &#34;test-symlink-comp-fbve-on-pull-request-6s69w&#34; failed: &#xA; pod: test-symlink-comp-fbve-on-p8b9e81beb80dd51301f43e6e1df8a5c2-pod | init container: prepare&#xA;2026/04/19 13:53:13 Entrypoint initialization&#xA;&#xA; pod: test-symlink-comp-fbve-on-p8b9e81beb80dd51301f43e6e1df8a5c2-pod | init container: place-scripts&#xA;2026/04/19 13:53:14 Decoded script /tekton/scripts/script-0-tp7km&#xA;2026/04/19 13:53:14 Decoded script /tekton/scripts/script-1-cc5r4&#xA;&#xA;pod: test-symlink-comp-fbve-on-p8b9e81beb80dd51301f43e6e1df8a5c2-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1776606797.165688,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1776606797.3760977,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/devfile-sample-python-basic @ 02147b8f9bff5260b72c35a7fc394ff4e9499cfc (grafted, HEAD) in path /workspace/output/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1776606797.376155,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1776606797.4016745,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /workspace/output/source&#34;}&#xA;Merge option disabled. Using checked-out revision 02147b8f9bff5260b72c35a7fc394ff4e9499cfc directly.&#xA;&#xA;pod: test-symlink-comp-fbve-on-p8b9e81beb80dd51301f43e6e1df8a5c2-pod | container step-symlink-check: &#xA;Running symlink check&#xA;The cloned repository contains symlink pointing outside of the cloned repository: /workspace/output/source/os-release-symlink&#xA;&#xA; pod: test-symlink-comp-fbve-on-pull-request-6s69w-init-pod | init container: prepare&#xA;2026/04/19 13:53:05 Entrypoint initialization&#xA;&#xA;pod: test-symlink-comp-fbve-on-pull-request-6s69w-init-pod | container step-init: &#xA;time=&#34;2026-04-19T13:53:08Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-19T13:53:08Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-19T13:53:08Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-19T13:53:08Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-19T13:53:08Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-19T13:53:08Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-19T13:53:08Z&#34; level=info msg=&#34;Cache proxy is disabled in param or in backend&#34;&#xA;time=&#34;2026-04-19T13:53:08Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-19T13:53:08Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&lt; Exit [It] pipelineRun should fail for symlink component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-fbve - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:816 @ 04/19/26 14:08:02.642 (591ms)&#xA;&gt; Enter [AfterAll] HACBS pipelines - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:271 @ 04/19/26 14:08:02.642&#xA;&lt; Exit [AfterAll] HACBS pipelines - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:271 @ 04/19/26 14:08:12.336 (9.693s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:08:12.336&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.Z3cR7n2baf/tests/build/build_templates.go:207 @ 04/19/26 14:08:12.336 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="82.678595456">
              <system-err>&gt; Enter [BeforeAll] PaC component build - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:55 @ 04/19/26 13:50:24.272&#xA;&lt; Exit [BeforeAll] PaC component build - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:55 @ 04/19/26 13:50:35.859 (11.587s)&#xA;&gt; Enter [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:118 @ 04/19/26 13:50:35.859&#xA;Image repository for component gh-test-custom-default-yuxsbr in namespace build-e2e-jmdj do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gh-test-custom-default-yuxsbr in namespace build-e2e-jmdj do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gh-test-custom-default-yuxsbr in namespace build-e2e-jmdj do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:118 @ 04/19/26 13:51:15.927 (40.068s)&#xA;&gt; Enter [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:137 @ 04/19/26 13:51:15.927&#xA;&lt; Exit [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:137 @ 04/19/26 13:51:46.95 (31.023s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:51:46.951&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:51:46.951 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.0197083">
              <system-err>&gt; Enter [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:154 @ 04/19/26 13:51:46.951&#xA;&lt; Exit [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:154 @ 04/19/26 13:51:46.971 (19ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:51:46.971&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:51:46.971 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.019374075">
              <system-err>&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:177 @ 04/19/26 13:51:46.971&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:177 @ 04/19/26 13:51:46.99 (19ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:51:46.99&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:51:46.99 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000261925">
              <system-err>&gt; Enter [It] build pipeline uses the correct serviceAccount - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:192 @ 04/19/26 13:51:46.991&#xA;&lt; Exit [It] build pipeline uses the correct serviceAccount - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:192 @ 04/19/26 13:51:46.991 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:51:46.991&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:51:46.991 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.017644253">
              <system-err>&gt; Enter [It] component build status is set correctly - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:196 @ 04/19/26 13:51:46.991&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;enabled&#34;,&#34;merge-url&#34;:&#34;https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-lnkvwg/pull/1&#34;,&#34;configuration-time&#34;:&#34;Sun, 19 Apr 2026 13:51:42 UTC&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;state: enabled&#xA;mergeUrl: https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-lnkvwg/pull/1&#xA;errId: 0&#xA;errMessage: &#xA;configurationTime: Sun, 19 Apr 2026 13:51:42 UTC&#xA;&lt; Exit [It] component build status is set correctly - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:196 @ 04/19/26 13:51:47.009 (17ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:51:47.009&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:51:47.009 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.966063409">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:226 @ 04/19/26 13:51:47.01&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:226 @ 04/19/26 13:51:47.975 (966ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:51:47.975&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:51:47.975 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.281375017">
              <system-err>&gt; Enter [It] created image repo is private - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:244 @ 04/19/26 13:51:47.976&#xA;&lt; Exit [It] created image repo is private - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:244 @ 04/19/26 13:51:48.257 (281ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:51:48.257&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:51:48.257 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="11.032728135">
              <system-err>&gt; Enter [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:250 @ 04/19/26 13:51:48.258&#xA;&lt; Exit [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:250 @ 04/19/26 13:51:59.29 (11.032s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:51:59.291&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:51:59.291 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="1.270316798">
              <system-err>&gt; Enter [It] PR branch should not exist in the repo - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:266 @ 04/19/26 13:51:59.291&#xA;&lt; Exit [It] PR branch should not exist in the repo - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:266 @ 04/19/26 13:52:00.561 (1.27s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:00.561&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:00.561 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="11.29578661">
              <system-err>&gt; Enter [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:279 @ 04/19/26 13:52:00.562&#xA;&lt; Exit [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:279 @ 04/19/26 13:52:11.857 (11.295s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:11.858&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:11.858 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="50.106158324">
              <system-err>&gt; Enter [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:307 @ 04/19/26 13:52:11.858&#xA;&lt; Exit [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:307 @ 04/19/26 13:52:21.923 (10.065s)&#xA;&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:333 @ 04/19/26 13:52:21.923&#xA;PipelineRun has not been created yet for the component build-e2e-jmdj/gh-test-custom-branch-qugrbg&#xA;PipelineRun has not been created yet for the component build-e2e-jmdj/gh-test-custom-branch-qugrbg&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:333 @ 04/19/26 13:53:01.964 (40.041s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:53:01.964&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:53:01.964 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.216808919">
              <system-err>&gt; Enter [It] should lead to a PaC init PR creation - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:348 @ 04/19/26 13:53:01.965&#xA;&lt; Exit [It] should lead to a PaC init PR creation - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:348 @ 04/19/26 13:53:02.181 (216ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:53:02.182&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:53:02.182 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="440.025353983">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:366 @ 04/19/26 13:53:02.182&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m found for Component build-e2e-jmdj/gh-test-custom-branch-qugrbg&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-94n7m reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:366 @ 04/19/26 14:00:22.207 (7m20.025s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:22.207&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:22.207 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="1.056801798">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:372 @ 04/19/26 14:00:22.208&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:372 @ 04/19/26 14:00:23.264 (1.056s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:23.264&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:23.264 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created floating tags are created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.677530372">
              <system-err>&gt; Enter [It] floating tags are created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:391 @ 04/19/26 14:00:23.265&#xA;&lt; Exit [It] floating tags are created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:391 @ 04/19/26 14:00:23.942 (677ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:23.942&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:23.942 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.273122729">
              <system-err>&gt; Enter [It] created image repo is public - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:404 @ 04/19/26 14:00:23.943&#xA;&lt; Exit [It] created image repo is public - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:404 @ 04/19/26 14:00:24.216 (273ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:24.216&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:24.216 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.441687139">
              <system-err>&gt; Enter [It] image tag is updated successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:410 @ 04/19/26 14:00:24.217&#xA;Image tag quay.io/redhat-appstudio-qe/build-e2e-jmdj/gh-test-custom-branch-qugrbg:on-pr-4fcddc0551f87f522f5bd920135dd7657fc56207 successfully found in Quay&#xA;&lt; Exit [It] image tag is updated successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:410 @ 04/19/26 14:00:24.658 (441ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:24.658&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:24.658 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.404745599">
              <system-err>&gt; Enter [It] should ensure pruning labels are set - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:439 @ 04/19/26 14:00:24.659&#xA;&lt; Exit [It] should ensure pruning labels are set - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:439 @ 04/19/26 14:00:25.063 (404ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:25.063&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:25.063 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.398761389">
              <system-err>&gt; Enter [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:453 @ 04/19/26 14:00:25.064&#xA;&lt; Exit [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:453 @ 04/19/26 14:00:25.398 (334ms)&#xA;&gt; Enter [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:325 @ 04/19/26 14:00:25.398&#xA;&lt; Exit [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:325 @ 04/19/26 14:00:25.462 (64ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:25.463&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:25.463 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="20.563182987">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is updated - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:468 @ 04/19/26 14:00:25.463&#xA;created file sha: 0b2a9f3a13f1b6978a4653f54806d2eacb71148e&#xA;&lt; Exit [BeforeAll] when the PaC init branch is updated - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:468 @ 04/19/26 14:00:25.997 (534ms)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:478 @ 04/19/26 14:00:25.997&#xA;PipelineRun has not been created yet for the component build-e2e-jmdj/gh-test-custom-branch-qugrbg&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:478 @ 04/19/26 14:00:46.026 (20.029s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:46.026&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:46.026 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.216583002">
              <system-err>&gt; Enter [It] should lead to a PaC init PR update - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:493 @ 04/19/26 14:00:46.027&#xA;&lt; Exit [It] should lead to a PaC init PR update - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:493 @ 04/19/26 14:00:46.243 (216ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:46.243&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:46.243 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="120.014699956">
              <system-err>&gt; Enter [It] PipelineRun should eventually finish - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:512 @ 04/19/26 14:00:46.244&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-qrjvl found for Component build-e2e-jmdj/gh-test-custom-branch-qugrbg&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-qrjvl reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-qrjvl reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-qrjvl reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-qrjvl reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-qrjvl reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-qrjvl reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-pull-request-qrjvl reason: Completed&#xA;&lt; Exit [It] PipelineRun should eventually finish - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:512 @ 04/19/26 14:02:46.258 (2m0.014s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:02:46.258&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:02:46.258 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.391503111">
              <system-err>&gt; Enter [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:518 @ 04/19/26 14:02:46.259&#xA;&lt; Exit [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:518 @ 04/19/26 14:02:46.65 (391ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:02:46.65&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:02:46.65 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="21.777253275">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is merged - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:534 @ 04/19/26 14:02:46.651&#xA;merged result sha: 8bcc71e0c63b573e9371db848df6fcb6b33379b9&#xA;&lt; Exit [BeforeAll] when the PaC init branch is merged - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:534 @ 04/19/26 14:02:48.233 (1.582s)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:544 @ 04/19/26 14:02:48.233&#xA;PipelineRun has not been created yet for the component build-e2e-jmdj/gh-test-custom-branch-qugrbg&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:544 @ 04/19/26 14:03:08.428 (20.195s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:03:08.428&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:03:08.428 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="180.012752169">
              <system-err>&gt; Enter [It] pipelineRun should eventually finish - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:560 @ 04/19/26 14:03:08.429&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-push-smr7b found for Component build-e2e-jmdj/gh-test-custom-branch-qugrbg&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-push-smr7b reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-push-smr7b reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-push-smr7b reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-push-smr7b reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-push-smr7b reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-push-smr7b reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-push-smr7b reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-push-smr7b reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-push-smr7b reason: Running&#xA;PipelineRun gh-test-custom-branch-qugrbg-on-push-smr7b reason: Completed&#xA;&lt; Exit [It] pipelineRun should eventually finish - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:560 @ 04/19/26 14:06:08.441 (3m0.012s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:06:08.441&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:06:08.441 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.358517849">
              <system-err>&gt; Enter [It] does not have expiration set - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:566 @ 04/19/26 14:06:08.442&#xA;&lt; Exit [It] does not have expiration set - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:566 @ 04/19/26 14:06:08.8 (358ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:06:08.8&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:06:08.8 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="121.795670213">
              <system-err>&gt; Enter [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:578 @ 04/19/26 14:06:08.801&#xA;waiting for one minute and expecting to not trigger a PipelineRun&#xA;&lt; Exit [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:578 @ 04/19/26 14:08:10.596 (2m1.795s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:08:10.596&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:08:10.596 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.391529344">
              <system-err>&gt; Enter [It] image repo is updated to private - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:609 @ 04/19/26 14:08:10.597&#xA;&lt; Exit [It] image repo is updated to private - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:609 @ 04/19/26 14:08:10.988 (391ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:08:10.988&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:08:10.988 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the component is removed and recreated (with the same name in the same namespace) should no longer lead to a creation of a PaC PR [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="32.641181207">
              <system-err>&gt; Enter [BeforeAll] when the component is removed and recreated (with the same name in the same namespace) - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:664 @ 04/19/26 14:08:10.989&#xA;&lt; Exit [BeforeAll] when the component is removed and recreated (with the same name in the same namespace) - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:664 @ 04/19/26 14:08:20.871 (9.882s)&#xA;&gt; Enter [BeforeAll] when the component is removed and recreated (with the same name in the same namespace) - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:693 @ 04/19/26 14:08:20.871&#xA;&lt; Exit [BeforeAll] when the component is removed and recreated (with the same name in the same namespace) - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:693 @ 04/19/26 14:08:30.9 (10.029s)&#xA;&gt; Enter [It] should no longer lead to a creation of a PaC PR - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:729 @ 04/19/26 14:08:30.9&#xA;&lt; Exit [It] should no longer lead to a creation of a PaC PR - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:729 @ 04/19/26 14:08:40.901 (10s)&#xA;&gt; Enter [AfterAll] when the component is removed and recreated (with the same name in the same namespace) - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:711 @ 04/19/26 14:08:40.901&#xA;Found purge PR with id: 3&#xA;&lt; Exit [AfterAll] when the component is removed and recreated (with the same name in the same namespace) - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:711 @ 04/19/26 14:08:41.066 (165ms)&#xA;&gt; Enter [AfterAll] PaC component build - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:102 @ 04/19/26 14:08:41.066&#xA;&lt; Exit [AfterAll] PaC component build - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:102 @ 04/19/26 14:08:43.63 (2.564s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:08:43.63&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:08:43.63 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="96.508792543">
              <system-err>&gt; Enter [BeforeAll] PaC component build - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:55 @ 04/19/26 13:50:24.275&#xA;&lt; Exit [BeforeAll] PaC component build - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:55 @ 04/19/26 13:50:44.774 (20.498s)&#xA;&gt; Enter [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:118 @ 04/19/26 13:50:44.774&#xA;Image repository for component gl-test-custom-default-ilskqg in namespace build-e2e-twtw do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gl-test-custom-default-ilskqg in namespace build-e2e-twtw do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gl-test-custom-default-ilskqg in namespace build-e2e-twtw do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gl-test-custom-default-ilskqg in namespace build-e2e-twtw do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:118 @ 04/19/26 13:51:34.834 (50.06s)&#xA;&gt; Enter [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:137 @ 04/19/26 13:51:34.834&#xA;&lt; Exit [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:137 @ 04/19/26 13:52:00.784 (25.95s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:00.784&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:00.784 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.030351424">
              <system-err>&gt; Enter [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:154 @ 04/19/26 13:52:00.785&#xA;&lt; Exit [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:154 @ 04/19/26 13:52:00.814 (30ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:00.815&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:00.815 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="20.065878032">
              <system-err>&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:177 @ 04/19/26 13:52:00.815&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:177 @ 04/19/26 13:52:20.881 (20.066s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:20.881&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:20.881 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000243044">
              <system-err>&gt; Enter [It] build pipeline uses the correct serviceAccount - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:192 @ 04/19/26 13:52:20.881&#xA;&lt; Exit [It] build pipeline uses the correct serviceAccount - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:192 @ 04/19/26 13:52:20.881 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:20.882&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:20.882 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.024825337">
              <system-err>&gt; Enter [It] component build status is set correctly - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:196 @ 04/19/26 13:52:20.883&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;enabled&#34;,&#34;merge-url&#34;:&#34;https://gitlab.com/konflux-qe/devfile-sample-hello-world-xaesnp/-/merge_requests/1&#34;,&#34;configuration-time&#34;:&#34;Sun, 19 Apr 2026 13:51:56 UTC&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;state: enabled&#xA;mergeUrl: https://gitlab.com/konflux-qe/devfile-sample-hello-world-xaesnp/-/merge_requests/1&#xA;errId: 0&#xA;errMessage: &#xA;configurationTime: Sun, 19 Apr 2026 13:51:56 UTC&#xA;&lt; Exit [It] component build status is set correctly - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:196 @ 04/19/26 13:52:20.907 (24ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:20.907&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:20.907 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.989534553">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:226 @ 04/19/26 13:52:20.908&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:226 @ 04/19/26 13:52:21.897 (989ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:21.897&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:21.897 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.289314535">
              <system-err>&gt; Enter [It] created image repo is private - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:244 @ 04/19/26 13:52:21.898&#xA;&lt; Exit [It] created image repo is private - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:244 @ 04/19/26 13:52:22.187 (289ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:22.187&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:52:22.187 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="62.221042774">
              <system-err>&gt; Enter [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:250 @ 04/19/26 13:52:22.188&#xA;&lt; Exit [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:250 @ 04/19/26 13:53:24.408 (1m2.221s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:53:24.409&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:53:24.409 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.124389646">
              <system-err>&gt; Enter [It] PR branch should not exist in the repo - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:266 @ 04/19/26 13:53:24.409&#xA;&lt; Exit [It] PR branch should not exist in the repo - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:266 @ 04/19/26 13:53:24.533 (124ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:53:24.533&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:53:24.533 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.929066643">
              <system-err>&gt; Enter [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:279 @ 04/19/26 13:53:24.534&#xA;&lt; Exit [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:279 @ 04/19/26 13:53:25.463 (928ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:53:25.463&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:53:25.463 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="30.059126254">
              <system-err>&gt; Enter [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:307 @ 04/19/26 13:53:25.464&#xA;&lt; Exit [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:307 @ 04/19/26 13:53:35.496 (10.032s)&#xA;&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:333 @ 04/19/26 13:53:35.496&#xA;PipelineRun has not been created yet for the component build-e2e-twtw/gl-test-custom-branch-vujjft&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:333 @ 04/19/26 13:53:55.522 (20.026s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:53:55.523&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:53:55.523 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.208583488">
              <system-err>&gt; Enter [It] should lead to a PaC init PR creation - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:348 @ 04/19/26 13:53:55.523&#xA;&lt; Exit [It] should lead to a PaC init PR creation - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:348 @ 04/19/26 13:53:55.731 (208ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:53:55.732&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 13:53:55.732 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="400.013784772">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:366 @ 04/19/26 13:53:55.732&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw found for Component build-e2e-twtw/gl-test-custom-branch-vujjft&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-sf7sw reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:366 @ 04/19/26 14:00:35.746 (6m40.013s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:35.746&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:35.746 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.875522521">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:372 @ 04/19/26 14:00:35.746&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:372 @ 04/19/26 14:00:36.621 (875ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:36.622&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:36.622 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created floating tags are created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.812208737">
              <system-err>&gt; Enter [It] floating tags are created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:391 @ 04/19/26 14:00:36.622&#xA;&lt; Exit [It] floating tags are created successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:391 @ 04/19/26 14:00:37.434 (812ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:37.434&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:37.434 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.761676391">
              <system-err>&gt; Enter [It] created image repo is public - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:404 @ 04/19/26 14:00:37.435&#xA;&lt; Exit [It] created image repo is public - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:404 @ 04/19/26 14:00:38.196 (761ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:38.196&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:38.196 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.356816396">
              <system-err>&gt; Enter [It] image tag is updated successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:410 @ 04/19/26 14:00:38.197&#xA;Image tag quay.io/redhat-appstudio-qe/build-e2e-twtw/gl-test-custom-branch-vujjft:on-pr-9efa61acdb1ca3872496f5c7a3df6ab4031b3b68 successfully found in Quay&#xA;&lt; Exit [It] image tag is updated successfully - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:410 @ 04/19/26 14:00:38.554 (356ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:38.554&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:38.554 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.405793403">
              <system-err>&gt; Enter [It] should ensure pruning labels are set - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:439 @ 04/19/26 14:00:38.555&#xA;&lt; Exit [It] should ensure pruning labels are set - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:439 @ 04/19/26 14:00:38.96 (405ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:38.96&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:38.96 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.496785935">
              <system-err>&gt; Enter [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:453 @ 04/19/26 14:00:38.961&#xA;&lt; Exit [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:453 @ 04/19/26 14:00:39.341 (380ms)&#xA;&gt; Enter [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:325 @ 04/19/26 14:00:39.341&#xA;&lt; Exit [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:325 @ 04/19/26 14:00:39.457 (116ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:39.457&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:00:39.457 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="20.852727745">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is updated - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:468 @ 04/19/26 14:00:39.458&#xA;created file sha: 8642edee4050f971b378a8236e0ca984561ae751&#xA;&lt; Exit [BeforeAll] when the PaC init branch is updated - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:468 @ 04/19/26 14:00:40.269 (811ms)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:478 @ 04/19/26 14:00:40.269&#xA;PipelineRun has not been created yet for the component build-e2e-twtw/gl-test-custom-branch-vujjft&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:478 @ 04/19/26 14:01:00.31 (20.041s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:01:00.31&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:01:00.311 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.227208385">
              <system-err>&gt; Enter [It] should lead to a PaC init PR update - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:493 @ 04/19/26 14:01:00.311&#xA;&lt; Exit [It] should lead to a PaC init PR update - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:493 @ 04/19/26 14:01:00.538 (227ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:01:00.538&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:01:00.538 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="140.024449612">
              <system-err>&gt; Enter [It] PipelineRun should eventually finish - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:512 @ 04/19/26 14:01:00.539&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-5p8t7 found for Component build-e2e-twtw/gl-test-custom-branch-vujjft&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-5p8t7 reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-5p8t7 reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-5p8t7 reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-5p8t7 reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-5p8t7 reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-5p8t7 reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-5p8t7 reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-pull-request-5p8t7 reason: Completed&#xA;&lt; Exit [It] PipelineRun should eventually finish - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:512 @ 04/19/26 14:03:20.563 (2m20.024s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:03:20.563&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:03:20.563 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.41362194">
              <system-err>&gt; Enter [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:518 @ 04/19/26 14:03:20.564&#xA;&lt; Exit [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:518 @ 04/19/26 14:03:20.977 (413ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:03:20.977&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:03:20.977 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="21.353711781">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is merged - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:534 @ 04/19/26 14:03:20.978&#xA;merged result sha: 252c59d37b1891b03b833a4dbc4ca4675cea9279&#xA;&lt; Exit [BeforeAll] when the PaC init branch is merged - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:534 @ 04/19/26 14:03:22.306 (1.328s)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:544 @ 04/19/26 14:03:22.306&#xA;PipelineRun has not been created yet for the component build-e2e-twtw/gl-test-custom-branch-vujjft&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:544 @ 04/19/26 14:03:42.331 (20.025s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:03:42.331&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:03:42.331 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="180.013842092">
              <system-err>&gt; Enter [It] pipelineRun should eventually finish - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:560 @ 04/19/26 14:03:42.332&#xA;PipelineRun gl-test-custom-branch-vujjft-on-push-gdbnx found for Component build-e2e-twtw/gl-test-custom-branch-vujjft&#xA;PipelineRun gl-test-custom-branch-vujjft-on-push-gdbnx reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-push-gdbnx reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-push-gdbnx reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-push-gdbnx reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-push-gdbnx reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-push-gdbnx reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-push-gdbnx reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-push-gdbnx reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-push-gdbnx reason: Running&#xA;PipelineRun gl-test-custom-branch-vujjft-on-push-gdbnx reason: Completed&#xA;&lt; Exit [It] pipelineRun should eventually finish - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:560 @ 04/19/26 14:06:42.345 (3m0.013s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:06:42.346&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:06:42.346 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.314734338">
              <system-err>&gt; Enter [It] does not have expiration set - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:566 @ 04/19/26 14:06:42.346&#xA;&lt; Exit [It] does not have expiration set - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:566 @ 04/19/26 14:06:42.661 (314ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:06:42.661&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:06:42.661 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="121.739679771">
              <system-err>&gt; Enter [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:578 @ 04/19/26 14:06:42.661&#xA;waiting for one minute and expecting to not trigger a PipelineRun&#xA;&lt; Exit [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:578 @ 04/19/26 14:08:44.401 (2m1.739s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:08:44.401&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:08:44.401 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.329126531">
              <system-err>&gt; Enter [It] image repo is updated to private - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:609 @ 04/19/26 14:08:44.402&#xA;&lt; Exit [It] image repo is updated to private - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:609 @ 04/19/26 14:08:44.73 (329ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:08:44.73&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:08:44.731 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the component is removed and recreated (with the same name in the same namespace) should no longer lead to a creation of a PaC PR [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="16.561397978">
              <system-err>&gt; Enter [BeforeAll] when the component is removed and recreated (with the same name in the same namespace) - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:664 @ 04/19/26 14:08:44.731&#xA;&lt; Exit [BeforeAll] when the component is removed and recreated (with the same name in the same namespace) - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:664 @ 04/19/26 14:08:47.953 (3.222s)&#xA;&gt; Enter [BeforeAll] when the component is removed and recreated (with the same name in the same namespace) - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:693 @ 04/19/26 14:08:47.953&#xA;&lt; Exit [BeforeAll] when the component is removed and recreated (with the same name in the same namespace) - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:693 @ 04/19/26 14:08:47.995 (42ms)&#xA;&gt; Enter [It] should no longer lead to a creation of a PaC PR - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:729 @ 04/19/26 14:08:47.996&#xA;&lt; Exit [It] should no longer lead to a creation of a PaC PR - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:729 @ 04/19/26 14:08:57.996 (10.001s)&#xA;&gt; Enter [AfterAll] when the component is removed and recreated (with the same name in the same namespace) - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:711 @ 04/19/26 14:08:57.997&#xA;Found purge PR with id: 3&#xA;&lt; Exit [AfterAll] when the component is removed and recreated (with the same name in the same namespace) - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:711 @ 04/19/26 14:08:58.21 (213ms)&#xA;&gt; Enter [AfterAll] PaC component build - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:102 @ 04/19/26 14:08:58.21&#xA;&lt; Exit [AfterAll] PaC component build - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:102 @ 04/19/26 14:09:01.292 (3.082s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:09:01.293&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/pac_build.go:29 @ 04/19/26 14:09:01.293 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification verifies that a Release CR should have been created in the dev namespace [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification verifies that Release PipelineRun should eventually succeed [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification tests if the image was pushed to quay [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification verifies that a Release is marked as succeeded. [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates an application [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="41.921356564">
              <system-err>&gt; Enter [BeforeAll] Maven project - Default build - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:84 @ 04/19/26 13:50:24.073&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: initializing framework for appappMaven project - Default build&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: namespacesuserNamespacekonflux-kowkmanagedNamespacekonflux-kowk-managed&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: component configcomponentNamekonflux-demo-component-kcalpacBranchNamekonflux-konflux-demo-component-kcalcomponentRepositoryNamehacbs-test-project-konflux-demo&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: creating release configmanagedNamespacekonflux-kowk-manageduserNamespacekonflux-kowk&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo createReleaseConfig: creating managed namespacemanagedNamespacekonflux-kowk-managed&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo createReleaseConfig: creating release-service-accountmanagedNamespacekonflux-kowk-managed&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo createReleaseConfig: finishedmanagedNamespacekonflux-kowk-manageduserNamespacekonflux-kowk&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: created and linked release-catalog-trusted-artifacts-quay-secretmanagedNamespacekonflux-kowk-managed&#34;&#xA;created and linked release-catalog-trusted-artifacts-quay-secret in namespace &#34;konflux-kowk-managed&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: setup completeappMaven project - Default buildcomponentNamekonflux-demo-component-kcal&#34;&#xA;&lt; Exit [BeforeAll] Maven project - Default build - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:84 @ 04/19/26 13:51:05.843 (41.77s)&#xA;&gt; Enter [It] creates an application - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:189 @ 04/19/26 13:51:05.843&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: creating applicationapplicationNamekonflux-demo-appnamespacekonflux-kowk&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: application createdapplicationNamekonflux-demo-app&#34;&#xA;&lt; Exit [It] creates an application - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:189 @ 04/19/26 13:51:05.994 (151ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates an IntegrationTestScenario for the app [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.058123192">
              <system-err>&gt; Enter [It] creates an IntegrationTestScenario for the app - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:202 @ 04/19/26 13:51:05.995&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: creating IntegrationTestScenarioapplicationNamekonflux-demo-appnamespacekonflux-kowk&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: IntegrationTestScenario createdscenariomy-integration-test-siac&#34;&#xA;&lt; Exit [It] creates an IntegrationTestScenario for the app - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:202 @ 04/19/26 13:51:06.053 (58ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates new branch for the build [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.65154166">
              <system-err>&gt; Enter [It] creates new branch for the build - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:218 @ 04/19/26 13:51:06.053&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: creating branch for buildrepohacbs-test-project-konflux-demobranchbase-pjqtugfrommain&#34;&#xA;&lt; Exit [It] creates new branch for the build - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:218 @ 04/19/26 13:51:06.705 (651ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates component konflux-demo-component (private: false) from git source https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="40.143305483">
              <system-err>&gt; Enter [It] creates component konflux-demo-component (private: false) from git source https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:233 @ 04/19/26 13:51:06.705&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: creating componentcomponentNamekonflux-demo-component-kcalapplicationNamekonflux-demo-appnamespacekonflux-kowkrevisionbase-pjqtug&#34;&#xA;Image repository for component konflux-demo-component-kcal in namespace konflux-kowk do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component konflux-demo-component-kcal in namespace konflux-kowk do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component konflux-demo-component-kcal in namespace konflux-kowk do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: component createdcomponentNamekonflux-demo-component-kcal&#34;&#xA;&lt; Exit [It] creates component konflux-demo-component (private: false) from git source https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:233 @ 04/19/26 13:51:46.849 (40.143s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Component is created triggers creation of a PR in the sample repo [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="46.922997817">
              <system-err>&gt; Enter [It] triggers creation of a PR in the sample repo - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:259 @ 04/19/26 13:51:46.849&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for PaC PRrepohacbs-test-project-konflux-demopacBranchNamekonflux-konflux-demo-component-kcal&#34;&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-kcal (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-kcal (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-kcal (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-kcal (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-kcal (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-kcal (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-kcal (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-kcal (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-kcal (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-kcal (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-kcal (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-kcal (found 5 PRs)&#34; &#34;error&#34;=null&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: PaC PR createdprNumber29046prSHAa8a0b5d1ad5bfa1357a0e768f5f9a9d784d72e36&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for pull-request PipelineRun to appear (will delete it)componentkonflux-demo-component-kcalprSHAa8a0b5d1ad5bfa1357a0e768f5f9a9d784d72e36&#34;&#xA;PipelineRun not found yet for component konflux-kowk/konflux-demo-component-kcal prSHA a8a0b5d1ad5bfa1357a0e768f5f9a9d784d72e36: no pipelinerun found for component konflux-demo-component-kcal&#xA;&lt; Exit [It] triggers creation of a PR in the sample repo - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:259 @ 04/19/26 13:52:33.772 (46.923s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Component is created verifies component build status [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.014065619">
              <system-err>&gt; Enter [It] verifies component build status - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:297 @ 04/19/26 13:52:33.773&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: verifying component build status (PaC enabled)componentkonflux-demo-component-kcalnamespacekonflux-kowk&#34;&#xA;state: enabled&#xA;mergeUrl: https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo/pull/29046&#xA;errId: 0&#xA;errMessage: &#xA;configurationTime: Sun, 19 Apr 2026 13:52:13 UTC&#xA;&lt; Exit [It] verifies component build status - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:297 @ 04/19/26 13:52:33.787 (14ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Component is created should eventually lead to triggering a &#39;push&#39; event type PipelineRun after merging the PaC init branch  [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="21.488168971">
              <system-err>&gt; Enter [It] should eventually lead to triggering a &#39;push&#39; event type PipelineRun after merging the PaC init branch  - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:335 @ 04/19/26 13:52:33.787&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: merging PaC PRrepohacbs-test-project-konflux-demoprNumber29046&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: PaC PR mergedheadSHA1dc6580ea2177581106ef7a7bc3a5373b5412958&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for push PipelineRun to startcomponentkonflux-demo-component-kcalheadSHA1dc6580ea2177581106ef7a7bc3a5373b5412958&#34;&#xA;PipelineRun has not been created yet for component konflux-kowk/konflux-demo-component-kcal&#xA;&#34;msg&#34;=&#34;Konflux demo: GetComponentPipelineRun failed: no pipelinerun found for component konflux-demo-component-kcal&#34; &#34;error&#34;=null&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: push PipelineRun startedpipelineRunkonflux-demo-component-kcal-on-push-f7qsx&#34;&#xA;&lt; Exit [It] should eventually lead to triggering a &#39;push&#39; event type PipelineRun after merging the PaC init branch  - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:335 @ 04/19/26 13:52:55.275 (21.488s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun is created does not contain an annotation with a Snapshot Name [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000228814">
              <system-err>&gt; Enter [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:369 @ 04/19/26 13:52:55.276&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: checking build PipelineRun has no snapshot annotationpipelineRunkonflux-demo-component-kcal-on-push-f7qsx&#34;&#xA;&lt; Exit [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:369 @ 04/19/26 13:52:55.276 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun is created should eventually complete successfully [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="755.717638564">
              <system-err>&gt; Enter [It] should eventually complete successfully - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:373 @ 04/19/26 13:52:55.276&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for build PipelineRun to finishpipelineRunkonflux-demo-component-kcal-on-push-f7qsxcomponentkonflux-demo-component-kcalheadSHA1dc6580ea2177581106ef7a7bc3a5373b5412958&#34;&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx found for Component konflux-kowk/konflux-demo-component-kcal&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: ResolvingTaskRef&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: PipelineRunStopping&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: PipelineRunStopping&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: PipelineRunStopping&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: PipelineRunStopping&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: PipelineRunStopping&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: PipelineRunStopping&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: PipelineRunStopping&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: PipelineRunStopping&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: PipelineRunStopping&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: PipelineRunStopping&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: PipelineRunStopping&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: PipelineRunStopping&#xA;PipelineRun konflux-demo-component-kcal-on-push-f7qsx reason: Failed&#xA;attempt 1/6: PipelineRun &#34;konflux-demo-component-kcal-on-push-f7qsx&#34; failed: &#xA; pod: konflux-demo-component-kcal-on-push-f7qsx-apply-tags-pod | init container: prepare&#xA;2026/04/19 13:56:53 Entrypoint initialization&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-apply-tags-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-04-19T13:57:10Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#34;&#xA;time=&#34;2026-04-19T13:57:10Z&#34; level=info msg=&#34;[param] digest: sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625&#34;&#xA;time=&#34;2026-04-19T13:57:10Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-04-19T13:57:11Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}&#xA; pod: konflux-demo-component-kcal-on-push-f7qsx-build-container-pod | init container: prepare&#xA;2026/04/19 13:53:54 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-kcal-on-push-f7qsx-build-container-pod | init container: place-scripts&#xA;2026/04/19 13:53:56 Decoded script /tekton/scripts/script-1-z5chm&#xA;2026/04/19 13:53:56 Decoded script /tekton/scripts/script-2-fk66c&#xA;2026/04/19 13:53:56 Decoded script /tekton/scripts/script-3-vbzzl&#xA;2026/04/19 13:53:56 Decoded script /tekton/scripts/script-4-hv7gt&#xA;2026/04/19 13:53:56 Decoded script /tekton/scripts/script-5-xw5wz&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-build-container-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.i7RPEF/auth-kLjzRN.json quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:58cf784270f165085355f1ecd4e20ed0afb5d041bef39f1f0fc356c010ea208d --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:58cf784270f165085355f1ecd4e20ed0afb5d041bef39f1f0fc356c010ea208d to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-build-container-pod | container step-build: &#xA;[2026-04-19T13:54:00,260353377+00:00] Validate context path&#xA;[2026-04-19T13:54:00,263612242+00:00] Update CA trust&#xA;[2026-04-19T13:54:00,264722337+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-04-19T13:54:02,444978002+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-04-19T13:54:02,451134842+00:00] Prepare system (architecture: x86_64)&#xA;[2026-04-19T13:54:02,488751979+00:00] Setup prefetched&#xA;Trying to pull registry.access.redhat.com/ubi8/openjdk-17-runtime:1.23...&#xA;Getting image source signatures&#xA;Checking if image destination supports signatures&#xA;Copying blob sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#xA;Copying blob sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#xA;Copying config sha256:8a8c1b6debe1eb9195d5603daa93e6e901389eee8e9810ff64be52217f60741d&#xA;Writing manifest to image destination&#xA;Storing signatures&#xA;[2026-04-19T13:54:20,175615878+00:00] Unsetting proxy&#xA;{&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-04-19T13:54:02Z&#34;,&#xA;  &#34;com.redhat.component&#34;: &#34;openjdk-17-runtime-ubi8-container&#34;,&#xA;  &#34;com.redhat.license_terms&#34;: &#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI&#34;,&#xA;  &#34;cpe&#34;: &#34;cpe:/a:redhat:enterprise_linux:8::appstream&#34;,&#xA;  &#34;description&#34;: &#34;Image for Red Hat OpenShift providing OpenJDK 17 runtime&#34;,&#xA;  &#34;distribution-scope&#34;: &#34;public&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;,&#xA;  &#34;io.cekit.version&#34;: &#34;4.13.0.dev0&#34;,&#xA;  &#34;io.k8s.description&#34;: &#34;Platform for running plain Java applications (fat-jar and flat classpath)&#34;,&#xA;  &#34;io.k8s.display-name&#34;: &#34;Java Applications&#34;,&#xA;  &#34;io.openshift.expose-services&#34;: &#34;&#34;,&#xA;  &#34;io.openshift.tags&#34;: &#34;java&#34;,&#xA;  &#34;maintainer&#34;: &#34;Red Hat OpenJDK &lt;openjdk@redhat.com&gt;&#34;,&#xA;  &#34;name&#34;: &#34;ubi8/openjdk-17-runtime&#34;,&#xA;  &#34;org.jboss.product&#34;: &#34;openjdk&#34;,&#xA;  &#34;org.jboss.product.openjdk.version&#34;: &#34;17&#34;,&#xA;  &#34;org.jboss.product.version&#34;: &#34;17&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-04-19T13:54:02Z&#34;,&#xA;  &#34;org.opencontainers.image.documentation&#34;: &#34;https://rh-openjdk.github.io/redhat-openjdk-containers/&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;1dc6580ea2177581106ef7a7bc3a5373b5412958&#34;,&#xA;  &#34;release&#34;: &#34;4.1776047406&#34;,&#xA;  &#34;summary&#34;: &#34;Image for Red Hat OpenShift providing OpenJDK 17 runtime&#34;,&#xA;  &#34;url&#34;: &#34;https://access.redhat.com/containers/#/registry.access.redhat.com/ubi8/openjdk-17-runtime/images/1.23-4.1776047406&#34;,&#xA;  &#34;usage&#34;: &#34;https://rh-openjdk.github.io/redhat-openjdk-containers/&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;1dc6580ea2177581106ef7a7bc3a5373b5412958&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vendor&#34;: &#34;Red Hat, Inc.&#34;,&#xA;  &#34;version&#34;: &#34;1.23&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo&#34;&#xA;}&#xA;[2026-04-19T13:54:20,221223493+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-04-19T13:54:20,224989002+00:00] Add secrets&#xA;[2026-04-19T13:54:20,233100623+00:00] Run buildah build&#xA;[2026-04-19T13:54:20,234212600+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=1dc6580ea2177581106ef7a7bc3a5373b5412958 --label org.opencontainers.image.revision=1dc6580ea2177581106ef7a7bc3a5373b5412958 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo --label build-date=2026-04-19T13:54:02Z --label org.opencontainers.image.created=2026-04-19T13:54:02Z --annotation org.opencontainers.image.revision=1dc6580ea2177581106ef7a7bc3a5373b5412958 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo --annotation org.opencontainers.image.created=2026-04-19T13:54:02Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.hzEAGS -t quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958 . &#xA;[1/2] STEP 1/5: FROM registry.access.redhat.com/ubi8/openjdk-17:1.23 AS builder&#xA;Trying to pull registry.access.redhat.com/ubi8/openjdk-17:1.23...&#xA;Getting image source signatures&#xA;Checking if image destination supports signatures&#xA;Copying blob sha256:09f98c686de63ba39fe1c2d25eb997bde1a5ca76087c84a0a3cdb06407b7080a&#xA;Copying blob sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#xA;Copying config sha256:df97c90ad4902ce9834b0cd6e917acfb716f59ed6d04279198ddbf6de2d79960&#xA;Writing manifest to image destination&#xA;Storing signatures&#xA;[1/2] STEP 2/5: WORKDIR /work&#xA;[1/2] STEP 3/5: COPY . .&#xA;[1/2] STEP 4/5: USER 0&#xA;[1/2] STEP 5/5: RUN mvn clean package -DskipTests -DskipDocsGen&#xA;[INFO] Scanning for projects...&#xA;[INFO] &#xA;[INFO] ------------------&lt; org.example:simple-java-project &gt;-------------------&#xA;[INFO] Building simple-java-project 1.0-SNAPSHOT&#xA;[INFO] --------------------------------[ jar ]---------------------------------&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-shade-plugin/3.2.4/maven-shade-plugin-3.2.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-shade-plugin/3.2.4/maven-shade-plugin-3.2.4.pom (11 kB at 46 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/34/maven-plugins-34.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/34/maven-plugins-34.pom (11 kB at 289 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/34/maven-parent-34.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 43 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/34/maven-parent-34.pom (43 kB at 840 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/23/apache-23.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 18 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/23/apache-23.pom (18 kB at 485 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-shade-plugin/3.2.4/maven-shade-plugin-3.2.4.jar&#xA;Progress (1): 2.3/134 kB&#xD;Progress (1): 5.0/134 kB&#xD;Progress (1): 7.7/134 kB&#xD;Progress (1): 10/134 kB &#xD;Progress (1): 13/134 kB&#xD;Progress (1): 16/134 kB&#xD;Progress (1): 19/134 kB&#xD;Progress (1): 21/134 kB&#xD;Progress (1): 24/134 kB&#xD;Progress (1): 28/134 kB&#xD;Progress (1): 32/134 kB&#xD;Progress (1): 36/134 kB&#xD;Progress (1): 40/134 kB&#xD;Progress (1): 45/134 kB&#xD;Progress (1): 49/134 kB&#xD;Progress (1): 53/134 kB&#xD;Progress (1): 57/134 kB&#xD;Progress (1): 61/134 kB&#xD;Progress (1): 65/134 kB&#xD;Progress (1): 69/134 kB&#xD;Progress (1): 73/134 kB&#xD;Progress (1): 77/134 kB&#xD;Progress (1): 81/134 kB&#xD;Progress (1): 86/134 kB&#xD;Progress (1): 90/134 kB&#xD;Progress (1): 92/134 kB&#xD;Progress (1): 96/134 kB&#xD;Progress (1): 100/134 kB&#xD;Progress (1): 104/134 kB&#xD;Progress (1): 108/134 kB&#xD;Progress (1): 112/134 kB&#xD;Progress (1): 116/134 kB&#xD;Progress (1): 120/134 kB&#xD;Progress (1): 125/134 kB&#xD;Progress (1): 129/134 kB&#xD;Progress (1): 133/134 kB&#xD;Progress (1): 134 kB    &#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-shade-plugin/3.2.4/maven-shade-plugin-3.2.4.jar (134 kB at 2.4 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-clean-plugin/2.5/maven-clean-plugin-2.5.pom&#xA;Progress (1): 3.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-clean-plugin/2.5/maven-clean-plugin-2.5.pom (3.9 kB at 78 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/22/maven-plugins-22.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 13 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/22/maven-plugins-22.pom (13 kB at 261 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/21/maven-parent-21.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 26 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/21/maven-parent-21.pom (26 kB at 694 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/10/apache-10.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/10/apache-10.pom (15 kB at 352 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-clean-plugin/2.5/maven-clean-plugin-2.5.jar&#xA;Progress (1): 4.1/25 kB&#xD;Progress (1): 7.7/25 kB&#xD;Progress (1): 12/25 kB &#xD;Progress (1): 16/25 kB&#xD;Progress (1): 20/25 kB&#xD;Progress (1): 24/25 kB&#xD;Progress (1): 25 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-clean-plugin/2.5/maven-clean-plugin-2.5.jar (25 kB at 601 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-resources-plugin/2.6/maven-resources-plugin-2.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-resources-plugin/2.6/maven-resources-plugin-2.6.pom (8.1 kB at 208 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/23/maven-plugins-23.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 9.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/23/maven-plugins-23.pom (9.2 kB at 219 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/22/maven-parent-22.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 30 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/22/maven-parent-22.pom (30 kB at 633 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/11/apache-11.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/11/apache-11.pom (15 kB at 361 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-resources-plugin/2.6/maven-resources-plugin-2.6.jar&#xA;Progress (1): 4.1/30 kB&#xD;Progress (1): 7.7/30 kB&#xD;Progress (1): 12/30 kB &#xD;Progress (1): 16/30 kB&#xD;Progress (1): 20/30 kB&#xD;Progress (1): 24/30 kB&#xD;Progress (1): 28/30 kB&#xD;Progress (1): 30 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-resources-plugin/2.6/maven-resources-plugin-2.6.jar (30 kB at 777 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-compiler-plugin/3.1/maven-compiler-plugin-3.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 10 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-compiler-plugin/3.1/maven-compiler-plugin-3.1.pom (10 kB at 237 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/24/maven-plugins-24.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/24/maven-plugins-24.pom (11 kB at 216 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/23/maven-parent-23.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/23/maven-parent-23.pom (33 kB at 665 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/13/apache-13.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/13/apache-13.pom (14 kB at 304 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-compiler-plugin/3.1/maven-compiler-plugin-3.1.jar&#xA;Progress (1): 4.1/43 kB&#xD;Progress (1): 7.5/43 kB&#xD;Progress (1): 12/43 kB &#xD;Progress (1): 16/43 kB&#xD;Progress (1): 20/43 kB&#xD;Progress (1): 24/43 kB&#xD;Progress (1): 28/43 kB&#xD;Progress (1): 32/43 kB&#xD;Progress (1): 36/43 kB&#xD;Progress (1): 40/43 kB&#xD;Progress (1): 43 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-compiler-plugin/3.1/maven-compiler-plugin-3.1.jar (43 kB at 934 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-surefire-plugin/2.12.4/maven-surefire-plugin-2.12.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 10 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-surefire-plugin/2.12.4/maven-surefire-plugin-2.12.4.pom (10 kB at 233 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire/2.12.4/surefire-2.12.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire/2.12.4/surefire-2.12.4.pom (14 kB at 373 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-surefire-plugin/2.12.4/maven-surefire-plugin-2.12.4.jar&#xA;Progress (1): 4.1/30 kB&#xD;Progress (1): 7.7/30 kB&#xD;Progress (1): 12/30 kB &#xD;Progress (1): 16/30 kB&#xD;Progress (1): 20/30 kB&#xD;Progress (1): 24/30 kB&#xD;Progress (1): 28/30 kB&#xD;Progress (1): 30 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-surefire-plugin/2.12.4/maven-surefire-plugin-2.12.4.jar (30 kB at 708 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-jar-plugin/3.3.0/maven-jar-plugin-3.3.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-jar-plugin/3.3.0/maven-jar-plugin-3.3.0.pom (6.8 kB at 144 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/37/maven-plugins-37.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 9.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-plugins/37/maven-plugins-37.pom (9.9 kB at 225 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/37/maven-parent-37.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 45 kB&#xD;Progress (1): 46 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/37/maven-parent-37.pom (46 kB at 1.3 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/27/apache-27.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/27/apache-27.pom (20 kB at 566 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-jar-plugin/3.3.0/maven-jar-plugin-3.3.0.jar&#xA;Progress (1): 4.1/27 kB&#xD;Progress (1): 7.7/27 kB&#xD;Progress (1): 12/27 kB &#xD;Progress (1): 16/27 kB&#xD;Progress (1): 20/27 kB&#xD;Progress (1): 24/27 kB&#xD;Progress (1): 27 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugins/maven-jar-plugin/3.3.0/maven-jar-plugin-3.3.0.jar (27 kB at 547 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk17/0.1.2/simple-jdk17-0.1.2.pom&#xA;Progress (1): 3.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk17/0.1.2/simple-jdk17-0.1.2.pom (3.6 kB at 70 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/shaded/shaded-jdk11/1.9/shaded-jdk11-1.9.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/shaded/shaded-jdk11/1.9/shaded-jdk11-1.9.pom (5.0 kB at 104 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk8/1.2.4/simple-jdk8-1.2.4.pom&#xA;Progress (1): 3.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk8/1.2.4/simple-jdk8-1.2.4.pom (3.6 kB at 84 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/gradle/hacbs-test-simple-gradle-jdk8/1.1/hacbs-test-simple-gradle-jdk8-1.1.pom&#xA;Progress (1): 1.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/gradle/hacbs-test-simple-gradle-jdk8/1.1/hacbs-test-simple-gradle-jdk8-1.1.pom (1.8 kB at 39 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk17/0.1.2/simple-jdk17-0.1.2.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/shaded/shaded-jdk11/1.9/shaded-jdk11-1.9.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk8/1.2.4/simple-jdk8-1.2.4.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/gradle/hacbs-test-simple-gradle-jdk8/1.1/hacbs-test-simple-gradle-jdk8-1.1.jar&#xA;Progress (1): 3.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk17/0.1.2/simple-jdk17-0.1.2.jar (3.6 kB at 61 kB/s)&#xA;Progress (1): 2.3/7.1 kB&#xD;Progress (1): 5.0/7.1 kB&#xD;Progress (1): 7.1 kB    &#xD;Progress (2): 7.1 kB | 2.3/3.6 kB&#xD;Progress (2): 7.1 kB | 3.6 kB    &#xD;                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/shaded/shaded-jdk11/1.9/shaded-jdk11-1.9.jar (7.1 kB at 82 kB/s)&#xA;Progress (2): 3.6 kB | 2.0 kB&#xD;                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/simple/simple-jdk8/1.2.4/simple-jdk8-1.2.4.jar (3.6 kB at 44 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/io/github/stuartwdouglas/hacbs-test/gradle/hacbs-test-simple-gradle-jdk8/1.1/hacbs-test-simple-gradle-jdk8-1.1.jar (2.0 kB at 19 kB/s)&#xA;[INFO] &#xA;[INFO] --- maven-clean-plugin:2.5:clean (default-clean) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.6/maven-plugin-api-2.0.6.pom&#xA;Progress (1): 1.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.6/maven-plugin-api-2.0.6.pom (1.5 kB at 25 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.0.6/maven-2.0.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 9.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.0.6/maven-2.0.6.pom (9.0 kB at 164 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/5/maven-parent-5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/5/maven-parent-5.pom (15 kB at 195 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/3/apache-3.pom&#xA;Progress (1): 3.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/3/apache-3.pom (3.4 kB at 70 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.pom&#xA;Progress (1): 4.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.pom (4.1 kB at 66 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/16/spice-parent-16.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 8.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/16/spice-parent-16.pom (8.4 kB at 144 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/5/forge-parent-5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 8.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/5/forge-parent-5.pom (8.4 kB at 155 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.6/maven-plugin-api-2.0.6.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.jar&#xA;Progress (1): 2.3/13 kB&#xD;Progress (1): 5.0/13 kB&#xD;Progress (1): 7.7/13 kB&#xD;Progress (1): 12/13 kB &#xD;Progress (1): 13 kB   &#xD;Progress (2): 13 kB | 2.3/226 kB&#xD;Progress (2): 13 kB | 5.0/226 kB&#xD;Progress (2): 13 kB | 7.7/226 kB&#xD;Progress (2): 13 kB | 10/226 kB &#xD;Progress (2): 13 kB | 13/226 kB&#xD;Progress (2): 13 kB | 16/226 kB&#xD;Progress (2): 13 kB | 19/226 kB&#xD;Progress (2): 13 kB | 21/226 kB&#xD;Progress (2): 13 kB | 24/226 kB&#xD;Progress (2): 13 kB | 27/226 kB&#xD;Progress (2): 13 kB | 30/226 kB&#xD;Progress (2): 13 kB | 32/226 kB&#xD;Progress (2): 13 kB | 35/226 kB&#xD;Progress (2): 13 kB | 38/226 kB&#xD;Progress (2): 13 kB | 41/226 kB&#xD;Progress (2): 13 kB | 43/226 kB&#xD;Progress (2): 13 kB | 46/226 kB&#xD;Progress (2): 13 kB | 49/226 kB&#xD;Progress (2): 13 kB | 53/226 kB&#xD;Progress (2): 13 kB | 57/226 kB&#xD;Progress (2): 13 kB | 61/226 kB&#xD;Progress (2): 13 kB | 65/226 kB&#xD;Progress (2): 13 kB | 69/226 kB&#xD;Progress (2): 13 kB | 73/226 kB&#xD;Progress (2): 13 kB | 76/226 kB&#xD;Progress (2): 13 kB | 80/226 kB&#xD;Progress (2): 13 kB | 84/226 kB&#xD;Progress (2): 13 kB | 88/226 kB&#xD;Progress (2): 13 kB | 92/226 kB&#xD;Progress (2): 13 kB | 96/226 kB&#xD;Progress (2): 13 kB | 100/226 kB&#xD;Progress (2): 13 kB | 104/226 kB&#xD;Progress (2): 13 kB | 108/226 kB&#xD;Progress (2): 13 kB | 112/226 kB&#xD;Progress (2): 13 kB | 117/226 kB&#xD;Progress (2): 13 kB | 121/226 kB&#xD;Progress (2): 13 kB | 125/226 kB&#xD;Progress (2): 13 kB | 129/226 kB&#xD;Progress (2): 13 kB | 133/226 kB&#xD;Progress (2): 13 kB | 137/226 kB&#xD;Progress (2): 13 kB | 141/226 kB&#xD;Progress (2): 13 kB | 143/226 kB&#xD;Progress (2): 13 kB | 147/226 kB&#xD;Progress (2): 13 kB | 151/226 kB&#xD;Progress (2): 13 kB | 156/226 kB&#xD;Progress (2): 13 kB | 160/226 kB&#xD;Progress (2): 13 kB | 164/226 kB&#xD;Progress (2): 13 kB | 168/226 kB&#xD;Progress (2): 13 kB | 172/226 kB&#xD;Progress (2): 13 kB | 176/226 kB&#xD;Progress (2): 13 kB | 180/226 kB&#xD;Progress (2): 13 kB | 184/226 kB&#xD;Progress (2): 13 kB | 188/226 kB&#xD;Progress (2): 13 kB | 192/226 kB&#xD;Progress (2): 13 kB | 196/226 kB&#xD;Progress (2): 13 kB | 201/226 kB&#xD;Progress (2): 13 kB | 205/226 kB&#xD;Progress (2): 13 kB | 209/226 kB&#xD;Progress (2): 13 kB | 211/226 kB&#xD;Progress (2): 13 kB | 215/226 kB&#xD;Progress (2): 13 kB | 219/226 kB&#xD;Progress (2): 13 kB | 223/226 kB&#xD;Progress (2): 13 kB | 226 kB    &#xD;                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.6/maven-plugin-api-2.0.6.jar (13 kB at 218 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.jar (226 kB at 3.2 MB/s)&#xA;[INFO] &#xA;[INFO] --- maven-resources-plugin:2.6:resources (default-resources) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.6/maven-project-2.0.6.pom&#xA;Progress (1): 2.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.6/maven-project-2.0.6.pom (2.6 kB at 53 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.6/maven-settings-2.0.6.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.6/maven-settings-2.0.6.pom (2.0 kB at 44 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.6/maven-model-2.0.6.pom&#xA;Progress (1): 3.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.6/maven-model-2.0.6.pom (3.0 kB at 63 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.4.1/plexus-utils-1.4.1.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.4.1/plexus-utils-1.4.1.pom (1.9 kB at 39 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/1.0.11/plexus-1.0.11.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 9.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/1.0.11/plexus-1.0.11.pom (9.0 kB at 183 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9-stable-1/plexus-container-default-1.0-alpha-9-stable-1.pom&#xA;Progress (1): 3.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9-stable-1/plexus-container-default-1.0-alpha-9-stable-1.pom (3.9 kB at 73 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/1.0.3/plexus-containers-1.0.3.pom&#xA;Progress (1): 492 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/1.0.3/plexus-containers-1.0.3.pom (492 B at 7.5 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/1.0.4/plexus-1.0.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/1.0.4/plexus-1.0.4.pom (5.7 kB at 96 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.1/junit-3.8.1.pom&#xA;Progress (1): 998 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.1/junit-3.8.1.pom (998 B at 18 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.0.4/plexus-utils-1.0.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.0.4/plexus-utils-1.0.4.pom (6.9 kB at 140 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1-alpha-2/classworlds-1.1-alpha-2.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1-alpha-2/classworlds-1.1-alpha-2.pom (3.1 kB at 54 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.6/maven-profile-2.0.6.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.6/maven-profile-2.0.6.pom (2.0 kB at 37 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.6/maven-artifact-manager-2.0.6.pom&#xA;Progress (1): 2.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.6/maven-artifact-manager-2.0.6.pom (2.6 kB at 56 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.6/maven-repository-metadata-2.0.6.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.6/maven-repository-metadata-2.0.6.pom (1.9 kB at 43 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.6/maven-artifact-2.0.6.pom&#xA;Progress (1): 1.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.6/maven-artifact-2.0.6.pom (1.6 kB at 36 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.6/maven-plugin-registry-2.0.6.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.6/maven-plugin-registry-2.0.6.pom (1.9 kB at 42 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.6/maven-core-2.0.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.6/maven-core-2.0.6.pom (6.7 kB at 137 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.6/maven-plugin-parameter-documenter-2.0.6.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.6/maven-plugin-parameter-documenter-2.0.6.pom (1.9 kB at 43 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.6/maven-reporting-api-2.0.6.pom&#xA;Progress (1): 1.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.6/maven-reporting-api-2.0.6.pom (1.8 kB at 39 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting/2.0.6/maven-reporting-2.0.6.pom&#xA;Progress (1): 1.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting/2.0.6/maven-reporting-2.0.6.pom (1.4 kB at 32 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia-sink-api/1.0-alpha-7/doxia-sink-api-1.0-alpha-7.pom&#xA;Progress (1): 424 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia-sink-api/1.0-alpha-7/doxia-sink-api-1.0-alpha-7.pom (424 B at 8.8 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia/1.0-alpha-7/doxia-1.0-alpha-7.pom&#xA;Progress (1): 3.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia/1.0-alpha-7/doxia-1.0-alpha-7.pom (3.9 kB at 82 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.6/maven-error-diagnostics-2.0.6.pom&#xA;Progress (1): 1.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.6/maven-error-diagnostics-2.0.6.pom (1.7 kB at 24 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-cli/commons-cli/1.0/commons-cli-1.0.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-cli/commons-cli/1.0/commons-cli-1.0.pom (2.1 kB at 43 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.6/maven-plugin-descriptor-2.0.6.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.6/maven-plugin-descriptor-2.0.6.pom (2.0 kB at 38 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interactivity-api/1.0-alpha-4/plexus-interactivity-api-1.0-alpha-4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interactivity-api/1.0-alpha-4/plexus-interactivity-api-1.0-alpha-4.pom (7.1 kB at 142 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.6/maven-monitor-2.0.6.pom&#xA;Progress (1): 1.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.6/maven-monitor-2.0.6.pom (1.3 kB at 27 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1/classworlds-1.1.pom&#xA;Progress (1): 3.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1/classworlds-1.1.pom (3.3 kB at 83 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.5/plexus-utils-2.0.5.pom&#xA;Progress (1): 3.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.5/plexus-utils-2.0.5.pom (3.3 kB at 78 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.6/plexus-2.0.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 17 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.6/plexus-2.0.6.pom (17 kB at 279 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-filtering/1.1/maven-filtering-1.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-filtering/1.1/maven-filtering-1.1.pom (5.8 kB at 116 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/17/maven-shared-components-17.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 8.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/17/maven-shared-components-17.pom (8.7 kB at 185 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.15/plexus-utils-1.5.15.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.15/plexus-utils-1.5.15.pom (6.8 kB at 143 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.2/plexus-2.0.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.2/plexus-2.0.2.pom (12 kB at 258 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.12/plexus-interpolation-1.12.pom&#xA;Progress (1): 889 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.12/plexus-interpolation-1.12.pom (889 B at 19 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.14/plexus-components-1.1.14.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.14/plexus-components-1.1.14.pom (5.8 kB at 112 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-build-api/0.0.4/plexus-build-api-0.0.4.pom&#xA;Progress (1): 2.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-build-api/0.0.4/plexus-build-api-0.0.4.pom (2.9 kB at 54 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/10/spice-parent-10.pom&#xA;Progress (1): 3.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/10/spice-parent-10.pom (3.0 kB at 55 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/3/forge-parent-3.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/3/forge-parent-3.pom (5.0 kB at 101 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.8/plexus-utils-1.5.8.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.8/plexus-utils-1.5.8.pom (8.1 kB at 192 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.13/plexus-interpolation-1.13.pom&#xA;Progress (1): 890 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.13/plexus-interpolation-1.13.pom (890 B at 21 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.15/plexus-components-1.1.15.pom&#xA;Progress (1): 2.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.15/plexus-components-1.1.15.pom (2.8 kB at 62 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.3/plexus-2.0.3.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.3/plexus-2.0.3.pom (15 kB at 377 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.6/maven-project-2.0.6.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.6/maven-profile-2.0.6.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.6/maven-artifact-manager-2.0.6.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.6/maven-plugin-registry-2.0.6.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.6/maven-core-2.0.6.jar&#xA;Progress (1): 2.3/29 kB&#xD;Progress (1): 5.0/29 kB&#xD;Progress (1): 7.7/29 kB&#xD;Progress (2): 7.7/29 kB | 4.1/116 kB&#xD;Progress (2): 7.7/29 kB | 7.7/116 kB&#xD;Progress (2): 7.7/29 kB | 12/116 kB &#xD;Progress (2): 10/29 kB | 12/116 kB &#xD;Progress (2): 10/29 kB | 16/116 kB&#xD;Progress (2): 14/29 kB | 16/116 kB&#xD;Progress (2): 14/29 kB | 20/116 kB&#xD;Progress (2): 16/29 kB | 20/116 kB&#xD;Progress (2): 16/29 kB | 24/116 kB&#xD;Progress (2): 16/29 kB | 28/116 kB&#xD;Progress (2): 19/29 kB | 28/116 kB&#xD;Progress (2): 22/29 kB | 28/116 kB&#xD;Progress (2): 25/29 kB | 28/116 kB&#xD;Progress (2): 25/29 kB | 32/116 kB&#xD;Progress (2): 27/29 kB | 32/116 kB&#xD;Progress (2): 27/29 kB | 36/116 kB&#xD;Progress (2): 29 kB | 36/116 kB   &#xD;Progress (2): 29 kB | 40/116 kB&#xD;Progress (2): 29 kB | 45/116 kB&#xD;Progress (2): 29 kB | 49/116 kB&#xD;Progress (2): 29 kB | 53/116 kB&#xD;Progress (2): 29 kB | 57/116 kB&#xD;Progress (2): 29 kB | 61/116 kB&#xD;Progress (2): 29 kB | 65/116 kB&#xD;Progress (2): 29 kB | 69/116 kB&#xD;Progress (2): 29 kB | 73/116 kB&#xD;Progress (2): 29 kB | 77/116 kB&#xD;Progress (2): 29 kB | 81/116 kB&#xD;Progress (2): 29 kB | 86/116 kB&#xD;Progress (2): 29 kB | 90/116 kB&#xD;Progress (2): 29 kB | 94/116 kB&#xD;Progress (3): 29 kB | 94/116 kB | 3.4/35 kB&#xD;Progress (3): 29 kB | 98/116 kB | 3.4/35 kB&#xD;Progress (3): 29 kB | 98/116 kB | 7.5/35 kB&#xD;Progress (4): 29 kB | 98/116 kB | 7.5/35 kB | 4.1/57 kB&#xD;Progress (4): 29 kB | 102/116 kB | 7.5/35 kB | 4.1/57 kB&#xD;Progress (4): 29 kB | 102/116 kB | 12/35 kB | 4.1/57 kB &#xD;Progress (4): 29 kB | 102/116 kB | 16/35 kB | 4.1/57 kB&#xD;Progress (4): 29 kB | 102/116 kB | 20/35 kB | 4.1/57 kB&#xD;Progress (4): 29 kB | 102/116 kB | 20/35 kB | 8.2/57 kB&#xD;Progress (4): 29 kB | 106/116 kB | 20/35 kB | 8.2/57 kB&#xD;Progress (4): 29 kB | 106/116 kB | 20/35 kB | 12/57 kB &#xD;Progress (4): 29 kB | 106/116 kB | 20/35 kB | 16/57 kB&#xD;Progress (4): 29 kB | 106/116 kB | 20/35 kB | 20/57 kB&#xD;Progress (4): 29 kB | 106/116 kB | 24/35 kB | 20/57 kB&#xD;Progress (4): 29 kB | 106/116 kB | 24/35 kB | 25/57 kB&#xD;Progress (4): 29 kB | 110/116 kB | 24/35 kB | 25/57 kB&#xD;Progress (4): 29 kB | 110/116 kB | 28/35 kB | 25/57 kB&#xD;Progress (4): 29 kB | 114/116 kB | 28/35 kB | 25/57 kB&#xD;Progress (4): 29 kB | 114/116 kB | 28/35 kB | 29/57 kB&#xD;Progress (4): 29 kB | 114/116 kB | 32/35 kB | 29/57 kB&#xD;Progress (4): 29 kB | 116 kB | 32/35 kB | 29/57 kB    &#xD;Progress (4): 29 kB | 116 kB | 32/35 kB | 33/57 kB&#xD;Progress (4): 29 kB | 116 kB | 35 kB | 33/57 kB   &#xD;Progress (4): 29 kB | 116 kB | 35 kB | 37/57 kB&#xD;Progress (4): 29 kB | 116 kB | 35 kB | 41/57 kB&#xD;Progress (4): 29 kB | 116 kB | 35 kB | 45/57 kB&#xD;Progress (4): 29 kB | 116 kB | 35 kB | 49/57 kB&#xD;Progress (4): 29 kB | 116 kB | 35 kB | 53/57 kB&#xD;Progress (4): 29 kB | 116 kB | 35 kB | 57 kB   &#xD;                                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.6/maven-plugin-registry-2.0.6.jar (29 kB at 761 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.6/maven-plugin-parameter-documenter-2.0.6.jar&#xA;Progress (4): 116 kB | 35 kB | 57 kB | 2.3/152 kB&#xD;Progress (4): 116 kB | 35 kB | 57 kB | 5.0/152 kB&#xD;Progress (4): 116 kB | 35 kB | 57 kB | 7.7/152 kB&#xD;Progress (4): 116 kB | 35 kB | 57 kB | 10/152 kB &#xD;Progress (4): 116 kB | 35 kB | 57 kB | 13/152 kB&#xD;Progress (4): 116 kB | 35 kB | 57 kB | 16/152 kB&#xD;Progress (4): 116 kB | 35 kB | 57 kB | 19/152 kB&#xD;Progress (4): 116 kB | 35 kB | 57 kB | 21/152 kB&#xD;Progress (4): 116 kB | 35 kB | 57 kB | 24/152 kB&#xD;Progress (4): 116 kB | 35 kB | 57 kB | 27/152 kB&#xD;Progress (4): 116 kB | 35 kB | 57 kB | 30/152 kB&#xD;Progress (4): 116 kB | 35 kB | 57 kB | 32/152 kB&#xD;                                                &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.6/maven-artifact-manager-2.0.6.jar (57 kB at 1.2 MB/s)&#xA;Progress (3): 116 kB | 35 kB | 35/152 kB&#xD;                                        &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.6/maven-reporting-api-2.0.6.jar&#xA;Progress (3): 116 kB | 35 kB | 38/152 kB&#xD;Progress (3): 116 kB | 35 kB | 41/152 kB&#xD;Progress (3): 116 kB | 35 kB | 43/152 kB&#xD;Progress (3): 116 kB | 35 kB | 46/152 kB&#xD;Progress (3): 116 kB | 35 kB | 49/152 kB&#xD;                                        &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.6/maven-profile-2.0.6.jar (35 kB at 750 kB/s)&#xA;Progress (2): 116 kB | 52/152 kB&#xD;                                &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia-sink-api/1.0-alpha-7/doxia-sink-api-1.0-alpha-7.jar&#xA;Progress (2): 116 kB | 54/152 kB&#xD;Progress (2): 116 kB | 58/152 kB&#xD;Progress (2): 116 kB | 62/152 kB&#xD;Progress (2): 116 kB | 65/152 kB&#xD;Progress (2): 116 kB | 69/152 kB&#xD;Progress (2): 116 kB | 73/152 kB&#xD;Progress (2): 116 kB | 77/152 kB&#xD;Progress (2): 116 kB | 81/152 kB&#xD;Progress (2): 116 kB | 85/152 kB&#xD;Progress (2): 116 kB | 89/152 kB&#xD;Progress (2): 116 kB | 93/152 kB&#xD;Progress (2): 116 kB | 98/152 kB&#xD;Progress (2): 116 kB | 102/152 kB&#xD;Progress (2): 116 kB | 106/152 kB&#xD;Progress (2): 116 kB | 110/152 kB&#xD;Progress (2): 116 kB | 114/152 kB&#xD;Progress (2): 116 kB | 118/152 kB&#xD;Progress (2): 116 kB | 122/152 kB&#xD;Progress (2): 116 kB | 126/152 kB&#xD;Progress (2): 116 kB | 130/152 kB&#xD;Progress (2): 116 kB | 132/152 kB&#xD;Progress (2): 116 kB | 137/152 kB&#xD;                                 &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.6/maven-project-2.0.6.jar (116 kB at 2.2 MB/s)&#xA;Progress (1): 141/152 kB&#xD;                        &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.6/maven-repository-metadata-2.0.6.jar&#xA;Progress (1): 145/152 kB&#xD;Progress (1): 149/152 kB&#xD;Progress (1): 152 kB    &#xD;Progress (2): 152 kB | 2.3/21 kB&#xD;Progress (2): 152 kB | 5.0/21 kB&#xD;Progress (2): 152 kB | 7.7/21 kB&#xD;Progress (2): 152 kB | 10/21 kB &#xD;Progress (2): 152 kB | 13/21 kB&#xD;Progress (2): 152 kB | 17/21 kB&#xD;Progress (2): 152 kB | 21 kB   &#xD;Progress (3): 152 kB | 21 kB | 3.3/9.9 kB&#xD;Progress (3): 152 kB | 21 kB | 7.4/9.9 kB&#xD;Progress (3): 152 kB | 21 kB | 9.9 kB    &#xD;Progress (4): 152 kB | 21 kB | 9.9 kB | 3.8/24 kB&#xD;Progress (4): 152 kB | 21 kB | 9.9 kB | 7.8/24 kB&#xD;Progress (4): 152 kB | 21 kB | 9.9 kB | 12/24 kB &#xD;Progress (4): 152 kB | 21 kB | 9.9 kB | 16/24 kB&#xD;Progress (4): 152 kB | 21 kB | 9.9 kB | 20/24 kB&#xD;Progress (4): 152 kB | 21 kB | 9.9 kB | 24/24 kB&#xD;Progress (4): 152 kB | 21 kB | 9.9 kB | 24 kB   &#xD;                                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.6/maven-plugin-parameter-documenter-2.0.6.jar (21 kB at 297 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.6/maven-error-diagnostics-2.0.6.jar&#xA;Progress (4): 152 kB | 9.9 kB | 24 kB | 4.1/5.9 kB&#xD;Progress (4): 152 kB | 9.9 kB | 24 kB | 5.9 kB    &#xD;                                              &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.6/maven-core-2.0.6.jar (152 kB at 1.9 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-cli/commons-cli/1.0/commons-cli-1.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.6/maven-reporting-api-2.0.6.jar (9.9 kB at 126 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.6/maven-plugin-descriptor-2.0.6.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.6/maven-repository-metadata-2.0.6.jar (24 kB at 306 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interactivity-api/1.0-alpha-4/plexus-interactivity-api-1.0-alpha-4.jar&#xA;Progress (2): 5.9 kB | 3.8/14 kB&#xD;Progress (2): 5.9 kB | 7.8/14 kB&#xD;Progress (2): 5.9 kB | 12/14 kB &#xD;Progress (2): 5.9 kB | 14 kB   &#xD;                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/doxia/doxia-sink-api/1.0-alpha-7/doxia-sink-api-1.0-alpha-7.jar (5.9 kB at 65 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1/classworlds-1.1.jar&#xA;Progress (2): 14 kB | 4.1/30 kB&#xD;Progress (2): 14 kB | 7.7/30 kB&#xD;Progress (3): 14 kB | 7.7/30 kB | 3.8/13 kB&#xD;Progress (3): 14 kB | 12/30 kB | 3.8/13 kB &#xD;Progress (3): 14 kB | 16/30 kB | 3.8/13 kB&#xD;Progress (3): 14 kB | 16/30 kB | 7.8/13 kB&#xD;Progress (3): 14 kB | 16/30 kB | 12/13 kB &#xD;Progress (3): 14 kB | 16/30 kB | 13 kB   &#xD;Progress (3): 14 kB | 20/30 kB | 13 kB&#xD;Progress (3): 14 kB | 24/30 kB | 13 kB&#xD;Progress (3): 14 kB | 28/30 kB | 13 kB&#xD;Progress (3): 14 kB | 30 kB | 13 kB   &#xD;Progress (4): 14 kB | 30 kB | 13 kB | 3.8/37 kB&#xD;Progress (4): 14 kB | 30 kB | 13 kB | 7.8/37 kB&#xD;Progress (4): 14 kB | 30 kB | 13 kB | 12/37 kB &#xD;Progress (4): 14 kB | 30 kB | 13 kB | 16/37 kB&#xD;Progress (4): 14 kB | 30 kB | 13 kB | 20/37 kB&#xD;Progress (4): 14 kB | 30 kB | 13 kB | 24/37 kB&#xD;Progress (4): 14 kB | 30 kB | 13 kB | 28/37 kB&#xD;Progress (4): 14 kB | 30 kB | 13 kB | 32/37 kB&#xD;Progress (4): 14 kB | 30 kB | 13 kB | 37/37 kB&#xD;Progress (4): 14 kB | 30 kB | 13 kB | 37 kB   &#xD;                                           &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.6/maven-error-diagnostics-2.0.6.jar (14 kB at 127 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.6/maven-artifact-2.0.6.jar&#xA;Progress (4): 30 kB | 13 kB | 37 kB | 4.1/38 kB&#xD;Progress (4): 30 kB | 13 kB | 37 kB | 7.7/38 kB&#xD;Progress (4): 30 kB | 13 kB | 37 kB | 12/38 kB &#xD;Progress (4): 30 kB | 13 kB | 37 kB | 16/38 kB&#xD;Progress (4): 30 kB | 13 kB | 37 kB | 20/38 kB&#xD;Progress (4): 30 kB | 13 kB | 37 kB | 24/38 kB&#xD;Progress (4): 30 kB | 13 kB | 37 kB | 28/38 kB&#xD;Progress (4): 30 kB | 13 kB | 37 kB | 32/38 kB&#xD;Progress (4): 30 kB | 13 kB | 37 kB | 36/38 kB&#xD;Progress (4): 30 kB | 13 kB | 37 kB | 38 kB   &#xD;                                           &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interactivity-api/1.0-alpha-4/plexus-interactivity-api-1.0-alpha-4.jar (13 kB at 118 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.6/maven-settings-2.0.6.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/commons-cli/commons-cli/1.0/commons-cli-1.0.jar (30 kB at 260 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.6/maven-model-2.0.6.jar&#xA;Progress (3): 37 kB | 38 kB | 3.8/87 kB&#xD;Progress (3): 37 kB | 38 kB | 7.8/87 kB&#xD;                                       &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.6/maven-plugin-descriptor-2.0.6.jar (37 kB at 288 kB/s)&#xA;Progress (2): 38 kB | 12/87 kB&#xD;                              &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.6/maven-monitor-2.0.6.jar&#xA;Progress (2): 38 kB | 16/87 kB&#xD;Progress (2): 38 kB | 20/87 kB&#xD;Progress (2): 38 kB | 24/87 kB&#xD;Progress (2): 38 kB | 28/87 kB&#xD;Progress (2): 38 kB | 32/87 kB&#xD;Progress (2): 38 kB | 37/87 kB&#xD;Progress (2): 38 kB | 41/87 kB&#xD;Progress (2): 38 kB | 45/87 kB&#xD;Progress (2): 38 kB | 49/87 kB&#xD;Progress (2): 38 kB | 53/87 kB&#xD;Progress (2): 38 kB | 57/87 kB&#xD;Progress (3): 38 kB | 57/87 kB | 4.1/49 kB&#xD;Progress (3): 38 kB | 57/87 kB | 8.2/49 kB&#xD;Progress (3): 38 kB | 57/87 kB | 12/49 kB &#xD;Progress (3): 38 kB | 57/87 kB | 16/49 kB&#xD;Progress (3): 38 kB | 57/87 kB | 20/49 kB&#xD;Progress (3): 38 kB | 57/87 kB | 25/49 kB&#xD;Progress (3): 38 kB | 57/87 kB | 29/49 kB&#xD;Progress (3): 38 kB | 57/87 kB | 33/49 kB&#xD;Progress (3): 38 kB | 57/87 kB | 37/49 kB&#xD;Progress (3): 38 kB | 57/87 kB | 41/49 kB&#xD;Progress (3): 38 kB | 57/87 kB | 45/49 kB&#xD;Progress (3): 38 kB | 57/87 kB | 49 kB   &#xD;Progress (3): 38 kB | 61/87 kB | 49 kB&#xD;Progress (3): 38 kB | 65/87 kB | 49 kB&#xD;Progress (3): 38 kB | 69/87 kB | 49 kB&#xD;Progress (3): 38 kB | 71/87 kB | 49 kB&#xD;Progress (3): 38 kB | 76/87 kB | 49 kB&#xD;Progress (3): 38 kB | 80/87 kB | 49 kB&#xD;Progress (3): 38 kB | 84/87 kB | 49 kB&#xD;Progress (4): 38 kB | 84/87 kB | 49 kB | 4.1/86 kB&#xD;Progress (4): 38 kB | 87 kB | 49 kB | 4.1/86 kB   &#xD;Progress (4): 38 kB | 87 kB | 49 kB | 7.7/86 kB&#xD;Progress (4): 38 kB | 87 kB | 49 kB | 12/86 kB &#xD;Progress (4): 38 kB | 87 kB | 49 kB | 16/86 kB&#xD;Progress (4): 38 kB | 87 kB | 49 kB | 20/86 kB&#xD;Progress (4): 38 kB | 87 kB | 49 kB | 24/86 kB&#xD;Progress (4): 38 kB | 87 kB | 49 kB | 28/86 kB&#xD;Progress (4): 38 kB | 87 kB | 49 kB | 32/86 kB&#xD;                                              &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/classworlds/classworlds/1.1/classworlds-1.1.jar (38 kB at 274 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9-stable-1/plexus-container-default-1.0-alpha-9-stable-1.jar&#xA;Progress (3): 87 kB | 49 kB | 36/86 kB&#xD;Progress (3): 87 kB | 49 kB | 40/86 kB&#xD;Progress (3): 87 kB | 49 kB | 44/86 kB&#xD;Progress (3): 87 kB | 49 kB | 48/86 kB&#xD;Progress (3): 87 kB | 49 kB | 52/86 kB&#xD;Progress (3): 87 kB | 49 kB | 57/86 kB&#xD;Progress (3): 87 kB | 49 kB | 61/86 kB&#xD;Progress (3): 87 kB | 49 kB | 65/86 kB&#xD;Progress (3): 87 kB | 49 kB | 69/86 kB&#xD;Progress (3): 87 kB | 49 kB | 73/86 kB&#xD;Progress (3): 87 kB | 49 kB | 77/86 kB&#xD;Progress (3): 87 kB | 49 kB | 81/86 kB&#xD;Progress (3): 87 kB | 49 kB | 85/86 kB&#xD;Progress (3): 87 kB | 49 kB | 86 kB   &#xD;                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.6/maven-settings-2.0.6.jar (49 kB at 327 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.1/junit-3.8.1.jar&#xA;Progress (3): 87 kB | 86 kB | 3.8/10 kB&#xD;Progress (3): 87 kB | 86 kB | 7.8/10 kB&#xD;Progress (3): 87 kB | 86 kB | 10 kB    &#xD;                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.6/maven-artifact-2.0.6.jar (87 kB at 560 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.5/plexus-utils-2.0.5.jar&#xA;Progress (3): 86 kB | 10 kB | 4.1/194 kB&#xD;Progress (3): 86 kB | 10 kB | 7.7/194 kB&#xD;Progress (3): 86 kB | 10 kB | 12/194 kB &#xD;Progress (3): 86 kB | 10 kB | 16/194 kB&#xD;Progress (3): 86 kB | 10 kB | 20/194 kB&#xD;Progress (3): 86 kB | 10 kB | 24/194 kB&#xD;Progress (3): 86 kB | 10 kB | 28/194 kB&#xD;Progress (3): 86 kB | 10 kB | 32/194 kB&#xD;Progress (3): 86 kB | 10 kB | 36/194 kB&#xD;Progress (3): 86 kB | 10 kB | 40/194 kB&#xD;Progress (3): 86 kB | 10 kB | 44/194 kB&#xD;Progress (3): 86 kB | 10 kB | 48/194 kB&#xD;Progress (3): 86 kB | 10 kB | 53/194 kB&#xD;Progress (3): 86 kB | 10 kB | 57/194 kB&#xD;Progress (3): 86 kB | 10 kB | 61/194 kB&#xD;Progress (3): 86 kB | 10 kB | 65/194 kB&#xD;Progress (3): 86 kB | 10 kB | 69/194 kB&#xD;Progress (3): 86 kB | 10 kB | 73/194 kB&#xD;Progress (3): 86 kB | 10 kB | 77/194 kB&#xD;Progress (3): 86 kB | 10 kB | 81/194 kB&#xD;Progress (3): 86 kB | 10 kB | 85/194 kB&#xD;Progress (3): 86 kB | 10 kB | 89/194 kB&#xD;Progress (3): 86 kB | 10 kB | 93/194 kB&#xD;Progress (3): 86 kB | 10 kB | 98/194 kB&#xD;Progress (3): 86 kB | 10 kB | 102/194 kB&#xD;Progress (3): 86 kB | 10 kB | 106/194 kB&#xD;Progress (3): 86 kB | 10 kB | 110/194 kB&#xD;Progress (3): 86 kB | 10 kB | 114/194 kB&#xD;                                        &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.6/maven-model-2.0.6.jar (86 kB at 520 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-filtering/1.1/maven-filtering-1.1.jar&#xA;Progress (2): 10 kB | 118/194 kB&#xD;Progress (2): 10 kB | 122/194 kB&#xD;Progress (2): 10 kB | 126/194 kB&#xD;Progress (2): 10 kB | 130/194 kB&#xD;Progress (2): 10 kB | 134/194 kB&#xD;Progress (2): 10 kB | 139/194 kB&#xD;Progress (2): 10 kB | 143/194 kB&#xD;Progress (2): 10 kB | 147/194 kB&#xD;Progress (2): 10 kB | 151/194 kB&#xD;Progress (2): 10 kB | 155/194 kB&#xD;Progress (2): 10 kB | 159/194 kB&#xD;Progress (2): 10 kB | 163/194 kB&#xD;Progress (2): 10 kB | 167/194 kB&#xD;Progress (2): 10 kB | 171/194 kB&#xD;Progress (2): 10 kB | 175/194 kB&#xD;Progress (2): 10 kB | 179/194 kB&#xD;Progress (2): 10 kB | 184/194 kB&#xD;Progress (2): 10 kB | 188/194 kB&#xD;Progress (2): 10 kB | 192/194 kB&#xD;Progress (2): 10 kB | 194 kB    &#xD;Progress (3): 10 kB | 194 kB | 4.1/121 kB&#xD;Progress (3): 10 kB | 194 kB | 7.7/121 kB&#xD;Progress (3): 10 kB | 194 kB | 12/121 kB &#xD;Progress (3): 10 kB | 194 kB | 16/121 kB&#xD;Progress (3): 10 kB | 194 kB | 20/121 kB&#xD;Progress (3): 10 kB | 194 kB | 24/121 kB&#xD;Progress (3): 10 kB | 194 kB | 28/121 kB&#xD;Progress (3): 10 kB | 194 kB | 32/121 kB&#xD;Progress (3): 10 kB | 194 kB | 36/121 kB&#xD;Progress (3): 10 kB | 194 kB | 40/121 kB&#xD;Progress (3): 10 kB | 194 kB | 45/121 kB&#xD;Progress (3): 10 kB | 194 kB | 49/121 kB&#xD;Progress (3): 10 kB | 194 kB | 53/121 kB&#xD;Progress (3): 10 kB | 194 kB | 57/121 kB&#xD;Progress (3): 10 kB | 194 kB | 61/121 kB&#xD;Progress (3): 10 kB | 194 kB | 65/121 kB&#xD;Progress (3): 10 kB | 194 kB | 69/121 kB&#xD;Progress (3): 10 kB | 194 kB | 73/121 kB&#xD;Progress (3): 10 kB | 194 kB | 77/121 kB&#xD;Progress (3): 10 kB | 194 kB | 81/121 kB&#xD;Progress (3): 10 kB | 194 kB | 86/121 kB&#xD;Progress (3): 10 kB | 194 kB | 90/121 kB&#xD;Progress (3): 10 kB | 194 kB | 94/121 kB&#xD;Progress (3): 10 kB | 194 kB | 98/121 kB&#xD;Progress (3): 10 kB | 194 kB | 102/121 kB&#xD;                                         &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.6/maven-monitor-2.0.6.jar (10 kB at 59 kB/s)&#xA;Progress (2): 194 kB | 106/121 kB&#xD;Progress (3): 194 kB | 106/121 kB | 3.8/223 kB&#xD;Progress (3): 194 kB | 106/121 kB | 7.8/223 kB&#xD;Progress (3): 194 kB | 110/121 kB | 7.8/223 kB&#xD;Progress (3): 194 kB | 114/121 kB | 7.8/223 kB&#xD;Progress (3): 194 kB | 118/121 kB | 7.8/223 kB&#xD;Progress (3): 194 kB | 121 kB | 7.8/223 kB    &#xD;                                          &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-build-api/0.0.4/plexus-build-api-0.0.4.jar&#xA;Progress (3): 194 kB | 121 kB | 12/223 kB&#xD;Progress (3): 194 kB | 121 kB | 16/223 kB&#xD;Progress (3): 194 kB | 121 kB | 20/223 kB&#xD;Progress (3): 194 kB | 121 kB | 24/223 kB&#xD;Progress (3): 194 kB | 121 kB | 28/223 kB&#xD;Progress (3): 194 kB | 121 kB | 32/223 kB&#xD;Progress (3): 194 kB | 121 kB | 36/223 kB&#xD;Progress (3): 194 kB | 121 kB | 40/223 kB&#xD;Progress (3): 194 kB | 121 kB | 45/223 kB&#xD;Progress (3): 194 kB | 121 kB | 49/223 kB&#xD;Progress (3): 194 kB | 121 kB | 53/223 kB&#xD;Progress (3): 194 kB | 121 kB | 57/223 kB&#xD;Progress (3): 194 kB | 121 kB | 61/223 kB&#xD;Progress (3): 194 kB | 121 kB | 65/223 kB&#xD;Progress (3): 194 kB | 121 kB | 69/223 kB&#xD;Progress (3): 194 kB | 121 kB | 73/223 kB&#xD;Progress (3): 194 kB | 121 kB | 77/223 kB&#xD;Progress (3): 194 kB | 121 kB | 81/223 kB&#xD;Progress (3): 194 kB | 121 kB | 86/223 kB&#xD;Progress (3): 194 kB | 121 kB | 90/223 kB&#xD;Progress (3): 194 kB | 121 kB | 94/223 kB&#xD;Progress (3): 194 kB | 121 kB | 98/223 kB&#xD;Progress (3): 194 kB | 121 kB | 102/223 kB&#xD;Progress (3): 194 kB | 121 kB | 106/223 kB&#xD;Progress (3): 194 kB | 121 kB | 110/223 kB&#xD;Progress (3): 194 kB | 121 kB | 114/223 kB&#xD;Progress (3): 194 kB | 121 kB | 118/223 kB&#xD;Progress (3): 194 kB | 121 kB | 122/223 kB&#xD;Progress (3): 194 kB | 121 kB | 127/223 kB&#xD;Progress (3): 194 kB | 121 kB | 131/223 kB&#xD;Progress (3): 194 kB | 121 kB | 135/223 kB&#xD;Progress (3): 194 kB | 121 kB | 139/223 kB&#xD;Progress (3): 194 kB | 121 kB | 143/223 kB&#xD;Progress (3): 194 kB | 121 kB | 147/223 kB&#xD;Progress (3): 194 kB | 121 kB | 151/223 kB&#xD;Progress (3): 194 kB | 121 kB | 155/223 kB&#xD;Progress (3): 194 kB | 121 kB | 159/223 kB&#xD;Progress (3): 194 kB | 121 kB | 163/223 kB&#xD;Progress (3): 194 kB | 121 kB | 167/223 kB&#xD;Progress (3): 194 kB | 121 kB | 172/223 kB&#xD;Progress (3): 194 kB | 121 kB | 176/223 kB&#xD;Progress (3): 194 kB | 121 kB | 180/223 kB&#xD;Progress (3): 194 kB | 121 kB | 184/223 kB&#xD;Progress (3): 194 kB | 121 kB | 188/223 kB&#xD;Progress (3): 194 kB | 121 kB | 192/223 kB&#xD;Progress (3): 194 kB | 121 kB | 196/223 kB&#xD;Progress (3): 194 kB | 121 kB | 200/223 kB&#xD;Progress (3): 194 kB | 121 kB | 204/223 kB&#xD;Progress (4): 194 kB | 121 kB | 204/223 kB | 4.1/43 kB&#xD;Progress (4): 194 kB | 121 kB | 204/223 kB | 7.7/43 kB&#xD;Progress (4): 194 kB | 121 kB | 204/223 kB | 12/43 kB &#xD;Progress (4): 194 kB | 121 kB | 204/223 kB | 16/43 kB&#xD;Progress (4): 194 kB | 121 kB | 208/223 kB | 16/43 kB&#xD;Progress (4): 194 kB | 121 kB | 213/223 kB | 16/43 kB&#xD;Progress (4): 194 kB | 121 kB | 217/223 kB | 16/43 kB&#xD;Progress (4): 194 kB | 121 kB | 221/223 kB | 16/43 kB&#xD;Progress (4): 194 kB | 121 kB | 223 kB | 16/43 kB    &#xD;Progress (4): 194 kB | 121 kB | 223 kB | 20/43 kB&#xD;Progress (4): 194 kB | 121 kB | 223 kB | 24/43 kB&#xD;Progress (4): 194 kB | 121 kB | 223 kB | 28/43 kB&#xD;Progress (4): 194 kB | 121 kB | 223 kB | 32/43 kB&#xD;                                                 &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9-stable-1/plexus-container-default-1.0-alpha-9-stable-1.jar (194 kB at 1.0 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.13/plexus-interpolation-1.13.jar&#xA;Progress (3): 121 kB | 223 kB | 36/43 kB&#xD;Progress (3): 121 kB | 223 kB | 40/43 kB&#xD;Progress (3): 121 kB | 223 kB | 43 kB   &#xD;                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.1/junit-3.8.1.jar (121 kB at 637 kB/s)&#xA;Progress (3): 223 kB | 43 kB | 3.4/6.8 kB&#xD;Progress (3): 223 kB | 43 kB | 6.8 kB    &#xD;                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-filtering/1.1/maven-filtering-1.1.jar (43 kB at 210 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.5/plexus-utils-2.0.5.jar (223 kB at 1.1 MB/s)&#xA;Progress (2): 6.8 kB | 4.1/61 kB&#xD;Progress (2): 6.8 kB | 8.2/61 kB&#xD;Progress (2): 6.8 kB | 12/61 kB &#xD;Progress (2): 6.8 kB | 16/61 kB&#xD;Progress (2): 6.8 kB | 20/61 kB&#xD;Progress (2): 6.8 kB | 25/61 kB&#xD;Progress (2): 6.8 kB | 29/61 kB&#xD;Progress (2): 6.8 kB | 33/61 kB&#xD;Progress (2): 6.8 kB | 37/61 kB&#xD;Progress (2): 6.8 kB | 41/61 kB&#xD;Progress (2): 6.8 kB | 45/61 kB&#xD;Progress (2): 6.8 kB | 49/61 kB&#xD;Progress (2): 6.8 kB | 53/61 kB&#xD;Progress (2): 6.8 kB | 57/61 kB&#xD;Progress (2): 6.8 kB | 61 kB   &#xD;                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-build-api/0.0.4/plexus-build-api-0.0.4.jar (6.8 kB at 30 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.13/plexus-interpolation-1.13.jar (61 kB at 270 kB/s)&#xA;[WARNING] Using platform encoding (UTF-8 actually) to copy filtered resources, i.e. build is platform dependent!&#xA;[INFO] skip non existing resourceDirectory /work/src/main/resources&#xA;[INFO] &#xA;[INFO] --- maven-compiler-plugin:3.1:compile (default-compile) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.9/maven-plugin-api-2.0.9.pom&#xA;Progress (1): 1.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.9/maven-plugin-api-2.0.9.pom (1.5 kB at 50 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.0.9/maven-2.0.9.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 19 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.0.9/maven-2.0.9.pom (19 kB at 556 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/8/maven-parent-8.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 24 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/8/maven-parent-8.pom (24 kB at 447 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/4/apache-4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/4/apache-4.pom (4.5 kB at 125 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.9/maven-artifact-2.0.9.pom&#xA;Progress (1): 1.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.9/maven-artifact-2.0.9.pom (1.6 kB at 56 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.1/plexus-utils-1.5.1.pom&#xA;Progress (1): 2.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.1/plexus-utils-1.5.1.pom (2.3 kB at 82 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.9/maven-core-2.0.9.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.9/maven-core-2.0.9.pom (7.8 kB at 268 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.9/maven-settings-2.0.9.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.9/maven-settings-2.0.9.pom (2.1 kB at 69 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.9/maven-model-2.0.9.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.9/maven-model-2.0.9.pom (3.1 kB at 92 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.9/maven-plugin-parameter-documenter-2.0.9.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.9/maven-plugin-parameter-documenter-2.0.9.pom (2.0 kB at 50 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.9/maven-profile-2.0.9.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.9/maven-profile-2.0.9.pom (2.0 kB at 59 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.9/maven-repository-metadata-2.0.9.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.9/maven-repository-metadata-2.0.9.pom (1.9 kB at 59 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.9/maven-error-diagnostics-2.0.9.pom&#xA;Progress (1): 1.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.9/maven-error-diagnostics-2.0.9.pom (1.7 kB at 53 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.9/maven-project-2.0.9.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.9/maven-project-2.0.9.pom (2.7 kB at 85 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.9/maven-artifact-manager-2.0.9.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.9/maven-artifact-manager-2.0.9.pom (2.7 kB at 87 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.9/maven-plugin-registry-2.0.9.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.9/maven-plugin-registry-2.0.9.pom (2.0 kB at 48 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.9/maven-plugin-descriptor-2.0.9.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.9/maven-plugin-descriptor-2.0.9.pom (2.1 kB at 55 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.9/maven-monitor-2.0.9.pom&#xA;Progress (1): 1.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.9/maven-monitor-2.0.9.pom (1.3 kB at 38 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/1.0/maven-toolchain-1.0.pom&#xA;Progress (1): 3.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/1.0/maven-toolchain-1.0.pom (3.4 kB at 98 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/0.1/maven-shared-utils-0.1.pom&#xA;Progress (1): 4.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/0.1/maven-shared-utils-0.1.pom (4.0 kB at 112 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/18/maven-shared-components-18.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/18/maven-shared-components-18.pom (4.9 kB at 154 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/2.0.1/jsr305-2.0.1.pom&#xA;Progress (1): 965 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/2.0.1/jsr305-2.0.1.pom (965 B at 33 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-incremental/1.1/maven-shared-incremental-1.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-incremental/1.1/maven-shared-incremental-1.1.pom (4.7 kB at 132 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/19/maven-shared-components-19.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/19/maven-shared-components-19.pom (6.4 kB at 187 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.2.1/maven-plugin-api-2.2.1.pom&#xA;Progress (1): 1.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.2.1/maven-plugin-api-2.2.1.pom (1.5 kB at 50 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.2.1/maven-2.2.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 22 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/2.2.1/maven-2.2.1.pom (22 kB at 547 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/11/maven-parent-11.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 32 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/11/maven-parent-11.pom (32 kB at 790 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/5/apache-5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/5/apache-5.pom (4.1 kB at 114 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.2.1/maven-core-2.2.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.2.1/maven-core-2.2.1.pom (12 kB at 353 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.2.1/maven-settings-2.2.1.pom&#xA;Progress (1): 2.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.2.1/maven-settings-2.2.1.pom (2.2 kB at 73 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.2.1/maven-model-2.2.1.pom&#xA;Progress (1): 3.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.2.1/maven-model-2.2.1.pom (3.2 kB at 105 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.11/plexus-interpolation-1.11.pom&#xA;Progress (1): 889 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.11/plexus-interpolation-1.11.pom (889 B at 31 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.2.1/maven-plugin-parameter-documenter-2.2.1.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.2.1/maven-plugin-parameter-documenter-2.2.1.pom (2.0 kB at 70 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-jdk14/1.5.6/slf4j-jdk14-1.5.6.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-jdk14/1.5.6/slf4j-jdk14-1.5.6.pom (1.9 kB at 58 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.5.6/slf4j-parent-1.5.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.5.6/slf4j-parent-1.5.6.pom (7.9 kB at 220 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.5.6/slf4j-api-1.5.6.pom&#xA;Progress (1): 3.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.5.6/slf4j-api-1.5.6.pom (3.0 kB at 93 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/jcl-over-slf4j/1.5.6/jcl-over-slf4j-1.5.6.pom&#xA;Progress (1): 2.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/jcl-over-slf4j/1.5.6/jcl-over-slf4j-1.5.6.pom (2.2 kB at 68 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.2.1/maven-profile-2.2.1.pom&#xA;Progress (1): 2.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.2.1/maven-profile-2.2.1.pom (2.2 kB at 70 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.2.1/maven-artifact-2.2.1.pom&#xA;Progress (1): 1.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.2.1/maven-artifact-2.2.1.pom (1.6 kB at 48 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.2.1/maven-repository-metadata-2.2.1.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.2.1/maven-repository-metadata-2.2.1.pom (1.9 kB at 65 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.2.1/maven-error-diagnostics-2.2.1.pom&#xA;Progress (1): 1.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.2.1/maven-error-diagnostics-2.2.1.pom (1.7 kB at 40 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.2.1/maven-project-2.2.1.pom&#xA;Progress (1): 2.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.2.1/maven-project-2.2.1.pom (2.8 kB at 89 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.2.1/maven-artifact-manager-2.2.1.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.2.1/maven-artifact-manager-2.2.1.pom (3.1 kB at 94 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/backport-util-concurrent/backport-util-concurrent/3.1/backport-util-concurrent-3.1.pom&#xA;Progress (1): 880 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/backport-util-concurrent/backport-util-concurrent/3.1/backport-util-concurrent-3.1.pom (880 B at 22 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.2.1/maven-plugin-registry-2.2.1.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.2.1/maven-plugin-registry-2.2.1.pom (1.9 kB at 47 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.2.1/maven-plugin-descriptor-2.2.1.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.2.1/maven-plugin-descriptor-2.2.1.pom (2.1 kB at 56 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.2.1/maven-monitor-2.2.1.pom&#xA;Progress (1): 1.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.2.1/maven-monitor-2.2.1.pom (1.3 kB at 39 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-sec-dispatcher/1.3/plexus-sec-dispatcher-1.3.pom&#xA;Progress (1): 3.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-sec-dispatcher/1.3/plexus-sec-dispatcher-1.3.pom (3.0 kB at 96 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/12/spice-parent-12.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/12/spice-parent-12.pom (6.8 kB at 206 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/4/forge-parent-4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 8.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/4/forge-parent-4.pom (8.4 kB at 271 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.5/plexus-utils-1.5.5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.5/plexus-utils-1.5.5.pom (5.1 kB at 161 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-cipher/1.4/plexus-cipher-1.4.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-cipher/1.4/plexus-cipher-1.4.pom (2.1 kB at 52 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/1.5.5/plexus-component-annotations-1.5.5.pom&#xA;Progress (1): 815 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/1.5.5/plexus-component-annotations-1.5.5.pom (815 B at 24 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/1.5.5/plexus-containers-1.5.5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/1.5.5/plexus-containers-1.5.5.pom (4.2 kB at 128 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.7/plexus-2.0.7.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 17 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/2.0.7/plexus-2.0.7.pom (17 kB at 455 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-api/2.2/plexus-compiler-api-2.2.pom&#xA;Progress (1): 865 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-api/2.2/plexus-compiler-api-2.2.pom (865 B at 31 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler/2.2/plexus-compiler-2.2.pom&#xA;Progress (1): 3.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler/2.2/plexus-compiler-2.2.pom (3.6 kB at 95 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.3.1/plexus-components-1.3.1.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.3.1/plexus-components-1.3.1.pom (3.1 kB at 93 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/3.3.1/plexus-3.3.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/3.3.1/plexus-3.3.1.pom (20 kB at 538 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/17/spice-parent-17.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/spice/spice-parent/17/spice-parent-17.pom (6.8 kB at 260 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/10/forge-parent-10.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/10/forge-parent-10.pom (14 kB at 424 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0.8/plexus-utils-3.0.8.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0.8/plexus-utils-3.0.8.pom (3.1 kB at 98 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/3.2/plexus-3.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 19 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/3.2/plexus-3.2.pom (19 kB at 586 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-manager/2.2/plexus-compiler-manager-2.2.pom&#xA;Progress (1): 690 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-manager/2.2/plexus-compiler-manager-2.2.pom (690 B at 20 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-javac/2.2/plexus-compiler-javac-2.2.pom&#xA;Progress (1): 769 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-javac/2.2/plexus-compiler-javac-2.2.pom (769 B at 26 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compilers/2.2/plexus-compilers-2.2.pom&#xA;Progress (1): 1.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compilers/2.2/plexus-compilers-2.2.pom (1.2 kB at 38 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.5.5/plexus-container-default-1.5.5.pom&#xA;Progress (1): 2.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.5.5/plexus-container-default-1.5.5.pom (2.8 kB at 89 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.4.5/plexus-utils-1.4.5.pom&#xA;Progress (1): 2.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.4.5/plexus-utils-1.4.5.pom (2.3 kB at 81 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.2/plexus-classworlds-2.2.2.pom&#xA;Progress (1): 4.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.2/plexus-classworlds-2.2.2.pom (4.0 kB at 115 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean-reflect/3.4/xbean-reflect-3.4.pom&#xA;Progress (1): 2.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean-reflect/3.4/xbean-reflect-3.4.pom (2.8 kB at 76 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean/3.4/xbean-3.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 19 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean/3.4/xbean-3.4.pom (19 kB at 579 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/log4j/log4j/1.2.12/log4j-1.2.12.pom&#xA;Progress (1): 145 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/log4j/log4j/1.2.12/log4j-1.2.12.pom (145 B at 4.3 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-logging/commons-logging-api/1.1/commons-logging-api-1.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-logging/commons-logging-api/1.1/commons-logging-api-1.1.pom (5.3 kB at 149 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/collections/google-collections/1.0/google-collections-1.0.pom&#xA;Progress (1): 2.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/collections/google-collections/1.0/google-collections-1.0.pom (2.5 kB at 73 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/google/1/google-1.pom&#xA;Progress (1): 1.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/google/1/google-1.pom (1.6 kB at 43 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.2/junit-3.8.2.pom&#xA;Progress (1): 747 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.2/junit-3.8.2.pom (747 B at 23 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.9/maven-plugin-api-2.0.9.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.9/maven-artifact-2.0.9.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.1/plexus-utils-1.5.1.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.9/maven-core-2.0.9.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.9/maven-settings-2.0.9.jar&#xA;Progress (1): 4.1/13 kB&#xD;Progress (1): 7.7/13 kB&#xD;Progress (1): 12/13 kB &#xD;Progress (1): 13 kB   &#xD;Progress (2): 13 kB | 4.1/89 kB&#xD;Progress (2): 13 kB | 7.7/89 kB&#xD;Progress (2): 13 kB | 12/89 kB &#xD;Progress (2): 13 kB | 16/89 kB&#xD;Progress (2): 13 kB | 20/89 kB&#xD;Progress (2): 13 kB | 24/89 kB&#xD;Progress (2): 13 kB | 28/89 kB&#xD;Progress (2): 13 kB | 32/89 kB&#xD;Progress (2): 13 kB | 36/89 kB&#xD;Progress (2): 13 kB | 40/89 kB&#xD;Progress (2): 13 kB | 45/89 kB&#xD;Progress (2): 13 kB | 49/89 kB&#xD;Progress (2): 13 kB | 53/89 kB&#xD;Progress (2): 13 kB | 57/89 kB&#xD;Progress (2): 13 kB | 61/89 kB&#xD;Progress (2): 13 kB | 65/89 kB&#xD;Progress (2): 13 kB | 69/89 kB&#xD;Progress (2): 13 kB | 73/89 kB&#xD;Progress (2): 13 kB | 77/89 kB&#xD;Progress (2): 13 kB | 81/89 kB&#xD;Progress (2): 13 kB | 86/89 kB&#xD;Progress (2): 13 kB | 89 kB   &#xD;Progress (3): 13 kB | 89 kB | 4.1/211 kB&#xD;Progress (3): 13 kB | 89 kB | 7.7/211 kB&#xD;Progress (3): 13 kB | 89 kB | 12/211 kB &#xD;Progress (3): 13 kB | 89 kB | 16/211 kB&#xD;Progress (3): 13 kB | 89 kB | 20/211 kB&#xD;Progress (3): 13 kB | 89 kB | 24/211 kB&#xD;Progress (4): 13 kB | 89 kB | 24/211 kB | 3.8/160 kB&#xD;Progress (4): 13 kB | 89 kB | 24/211 kB | 7.8/160 kB&#xD;Progress (4): 13 kB | 89 kB | 24/211 kB | 12/160 kB &#xD;Progress (4): 13 kB | 89 kB | 24/211 kB | 16/160 kB&#xD;Progress (4): 13 kB | 89 kB | 24/211 kB | 20/160 kB&#xD;Progress (4): 13 kB | 89 kB | 24/211 kB | 24/160 kB&#xD;Progress (4): 13 kB | 89 kB | 24/211 kB | 28/160 kB&#xD;Progress (4): 13 kB | 89 kB | 24/211 kB | 32/160 kB&#xD;Progress (4): 13 kB | 89 kB | 24/211 kB | 37/160 kB&#xD;Progress (4): 13 kB | 89 kB | 24/211 kB | 41/160 kB&#xD;Progress (4): 13 kB | 89 kB | 24/211 kB | 45/160 kB&#xD;Progress (4): 13 kB | 89 kB | 28/211 kB | 45/160 kB&#xD;Progress (4): 13 kB | 89 kB | 32/211 kB | 45/160 kB&#xD;Progress (4): 13 kB | 89 kB | 32/211 kB | 49/160 kB&#xD;Progress (4): 13 kB | 89 kB | 36/211 kB | 49/160 kB&#xD;Progress (4): 13 kB | 89 kB | 36/211 kB | 53/160 kB&#xD;                                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/2.0.9/maven-plugin-api-2.0.9.jar (13 kB at 430 kB/s)&#xA;Progress (3): 89 kB | 40/211 kB | 53/160 kB&#xD;                                           &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.9/maven-plugin-parameter-documenter-2.0.9.jar&#xA;Progress (3): 89 kB | 40/211 kB | 57/160 kB&#xD;Progress (3): 89 kB | 40/211 kB | 61/160 kB&#xD;Progress (3): 89 kB | 40/211 kB | 65/160 kB&#xD;Progress (3): 89 kB | 40/211 kB | 69/160 kB&#xD;Progress (3): 89 kB | 40/211 kB | 73/160 kB&#xD;Progress (3): 89 kB | 40/211 kB | 77/160 kB&#xD;Progress (3): 89 kB | 40/211 kB | 82/160 kB&#xD;Progress (3): 89 kB | 40/211 kB | 86/160 kB&#xD;Progress (3): 89 kB | 40/211 kB | 90/160 kB&#xD;Progress (3): 89 kB | 40/211 kB | 94/160 kB&#xD;Progress (3): 89 kB | 40/211 kB | 98/160 kB&#xD;Progress (3): 89 kB | 40/211 kB | 102/160 kB&#xD;Progress (3): 89 kB | 40/211 kB | 106/160 kB&#xD;Progress (3): 89 kB | 40/211 kB | 110/160 kB&#xD;Progress (3): 89 kB | 40/211 kB | 114/160 kB&#xD;Progress (3): 89 kB | 40/211 kB | 118/160 kB&#xD;Progress (3): 89 kB | 40/211 kB | 123/160 kB&#xD;Progress (3): 89 kB | 45/211 kB | 123/160 kB&#xD;Progress (3): 89 kB | 45/211 kB | 127/160 kB&#xD;Progress (3): 89 kB | 49/211 kB | 127/160 kB&#xD;Progress (3): 89 kB | 49/211 kB | 131/160 kB&#xD;Progress (3): 89 kB | 53/211 kB | 131/160 kB&#xD;Progress (3): 89 kB | 53/211 kB | 135/160 kB&#xD;Progress (3): 89 kB | 57/211 kB | 135/160 kB&#xD;Progress (3): 89 kB | 57/211 kB | 139/160 kB&#xD;Progress (3): 89 kB | 57/211 kB | 143/160 kB&#xD;Progress (3): 89 kB | 57/211 kB | 147/160 kB&#xD;Progress (3): 89 kB | 57/211 kB | 151/160 kB&#xD;Progress (3): 89 kB | 57/211 kB | 155/160 kB&#xD;Progress (3): 89 kB | 57/211 kB | 159/160 kB&#xD;Progress (3): 89 kB | 57/211 kB | 160 kB    &#xD;Progress (3): 89 kB | 61/211 kB | 160 kB&#xD;Progress (3): 89 kB | 65/211 kB | 160 kB&#xD;Progress (3): 89 kB | 69/211 kB | 160 kB&#xD;Progress (3): 89 kB | 73/211 kB | 160 kB&#xD;Progress (3): 89 kB | 77/211 kB | 160 kB&#xD;Progress (3): 89 kB | 81/211 kB | 160 kB&#xD;Progress (3): 89 kB | 86/211 kB | 160 kB&#xD;Progress (3): 89 kB | 90/211 kB | 160 kB&#xD;Progress (3): 89 kB | 94/211 kB | 160 kB&#xD;Progress (3): 89 kB | 98/211 kB | 160 kB&#xD;Progress (3): 89 kB | 102/211 kB | 160 kB&#xD;Progress (3): 89 kB | 106/211 kB | 160 kB&#xD;Progress (4): 89 kB | 106/211 kB | 160 kB | 4.1/49 kB&#xD;Progress (4): 89 kB | 106/211 kB | 160 kB | 7.7/49 kB&#xD;Progress (4): 89 kB | 106/211 kB | 160 kB | 12/49 kB &#xD;Progress (4): 89 kB | 106/211 kB | 160 kB | 16/49 kB&#xD;Progress (4): 89 kB | 106/211 kB | 160 kB | 20/49 kB&#xD;Progress (4): 89 kB | 106/211 kB | 160 kB | 24/49 kB&#xD;Progress (4): 89 kB | 106/211 kB | 160 kB | 28/49 kB&#xD;Progress (4): 89 kB | 106/211 kB | 160 kB | 32/49 kB&#xD;Progress (4): 89 kB | 106/211 kB | 160 kB | 36/49 kB&#xD;Progress (4): 89 kB | 106/211 kB | 160 kB | 40/49 kB&#xD;Progress (4): 89 kB | 110/211 kB | 160 kB | 40/49 kB&#xD;Progress (4): 89 kB | 114/211 kB | 160 kB | 40/49 kB&#xD;Progress (4): 89 kB | 114/211 kB | 160 kB | 45/49 kB&#xD;Progress (4): 89 kB | 118/211 kB | 160 kB | 45/49 kB&#xD;Progress (4): 89 kB | 118/211 kB | 160 kB | 49/49 kB&#xD;Progress (4): 89 kB | 122/211 kB | 160 kB | 49/49 kB&#xD;Progress (4): 89 kB | 122/211 kB | 160 kB | 49 kB   &#xD;Progress (4): 89 kB | 126/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 131/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 135/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 139/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 143/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 147/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 151/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 155/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 159/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 163/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 167/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 172/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 176/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 180/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 184/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 188/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 192/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 196/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 200/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 204/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 208/211 kB | 160 kB | 49 kB&#xD;Progress (4): 89 kB | 211 kB | 160 kB | 49 kB    &#xD;                                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/2.0.9/maven-artifact-2.0.9.jar (89 kB at 1.7 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.9/maven-profile-2.0.9.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/2.0.9/maven-settings-2.0.9.jar (49 kB at 927 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.9/maven-model-2.0.9.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/2.0.9/maven-core-2.0.9.jar (160 kB at 3.0 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.9/maven-repository-metadata-2.0.9.jar&#xA;Progress (2): 211 kB | 4.1/21 kB&#xD;                                &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/1.5.1/plexus-utils-1.5.1.jar (211 kB at 3.7 MB/s)&#xA;Progress (1): 7.7/21 kB&#xD;                       &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.9/maven-error-diagnostics-2.0.9.jar&#xA;Progress (1): 12/21 kB&#xD;Progress (1): 16/21 kB&#xD;Progress (1): 20/21 kB&#xD;Progress (1): 21 kB   &#xD;Progress (2): 21 kB | 4.1/35 kB&#xD;Progress (2): 21 kB | 7.7/35 kB&#xD;Progress (2): 21 kB | 12/35 kB &#xD;Progress (2): 21 kB | 16/35 kB&#xD;Progress (2): 21 kB | 20/35 kB&#xD;Progress (2): 21 kB | 24/35 kB&#xD;Progress (2): 21 kB | 28/35 kB&#xD;Progress (2): 21 kB | 32/35 kB&#xD;Progress (2): 21 kB | 35 kB   &#xD;                           &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-parameter-documenter/2.0.9/maven-plugin-parameter-documenter-2.0.9.jar (21 kB at 286 kB/s)&#xA;Progress (2): 35 kB | 4.1/14 kB&#xD;                               &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.9/maven-project-2.0.9.jar&#xA;Progress (2): 35 kB | 7.7/14 kB&#xD;Progress (2): 35 kB | 12/14 kB &#xD;Progress (2): 35 kB | 14 kB   &#xD;Progress (3): 35 kB | 14 kB | 4.1/87 kB&#xD;Progress (3): 35 kB | 14 kB | 7.7/87 kB&#xD;Progress (3): 35 kB | 14 kB | 12/87 kB &#xD;Progress (3): 35 kB | 14 kB | 16/87 kB&#xD;Progress (3): 35 kB | 14 kB | 20/87 kB&#xD;Progress (3): 35 kB | 14 kB | 24/87 kB&#xD;Progress (3): 35 kB | 14 kB | 28/87 kB&#xD;Progress (3): 35 kB | 14 kB | 32/87 kB&#xD;Progress (4): 35 kB | 14 kB | 32/87 kB | 4.1/25 kB&#xD;Progress (4): 35 kB | 14 kB | 36/87 kB | 4.1/25 kB&#xD;Progress (4): 35 kB | 14 kB | 36/87 kB | 7.7/25 kB&#xD;Progress (4): 35 kB | 14 kB | 40/87 kB | 7.7/25 kB&#xD;Progress (4): 35 kB | 14 kB | 40/87 kB | 12/25 kB &#xD;Progress (4): 35 kB | 14 kB | 45/87 kB | 12/25 kB&#xD;Progress (4): 35 kB | 14 kB | 45/87 kB | 16/25 kB&#xD;Progress (4): 35 kB | 14 kB | 49/87 kB | 16/25 kB&#xD;Progress (4): 35 kB | 14 kB | 49/87 kB | 20/25 kB&#xD;Progress (4): 35 kB | 14 kB | 53/87 kB | 20/25 kB&#xD;Progress (4): 35 kB | 14 kB | 53/87 kB | 24/25 kB&#xD;Progress (4): 35 kB | 14 kB | 57/87 kB | 24/25 kB&#xD;Progress (4): 35 kB | 14 kB | 57/87 kB | 25 kB   &#xD;Progress (4): 35 kB | 14 kB | 61/87 kB | 25 kB&#xD;Progress (4): 35 kB | 14 kB | 65/87 kB | 25 kB&#xD;Progress (4): 35 kB | 14 kB | 69/87 kB | 25 kB&#xD;Progress (4): 35 kB | 14 kB | 73/87 kB | 25 kB&#xD;Progress (4): 35 kB | 14 kB | 77/87 kB | 25 kB&#xD;Progress (4): 35 kB | 14 kB | 81/87 kB | 25 kB&#xD;Progress (4): 35 kB | 14 kB | 86/87 kB | 25 kB&#xD;Progress (4): 35 kB | 14 kB | 87 kB | 25 kB   &#xD;                                           &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-profile/2.0.9/maven-profile-2.0.9.jar (35 kB at 416 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.9/maven-plugin-registry-2.0.9.jar&#xA;Progress (4): 14 kB | 87 kB | 25 kB | 4.1/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 7.7/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 12/122 kB &#xD;Progress (4): 14 kB | 87 kB | 25 kB | 16/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 20/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 24/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 28/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 32/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 36/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 40/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 44/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 48/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 53/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 57/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 61/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 65/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 69/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 73/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 77/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 81/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 85/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 89/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 93/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 98/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 102/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 106/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 110/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 114/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 118/122 kB&#xD;Progress (4): 14 kB | 87 kB | 25 kB | 122 kB    &#xD;                                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-error-diagnostics/2.0.9/maven-error-diagnostics-2.0.9.jar (14 kB at 151 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.9/maven-plugin-descriptor-2.0.9.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/2.0.9/maven-model-2.0.9.jar (87 kB at 891 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.9/maven-artifact-manager-2.0.9.jar&#xA;Progress (3): 25 kB | 122 kB | 4.1/29 kB&#xD;Progress (3): 25 kB | 122 kB | 7.7/29 kB&#xD;Progress (3): 25 kB | 122 kB | 12/29 kB &#xD;Progress (3): 25 kB | 122 kB | 16/29 kB&#xD;Progress (3): 25 kB | 122 kB | 20/29 kB&#xD;Progress (3): 25 kB | 122 kB | 24/29 kB&#xD;Progress (3): 25 kB | 122 kB | 28/29 kB&#xD;Progress (3): 25 kB | 122 kB | 29 kB   &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/2.0.9/maven-repository-metadata-2.0.9.jar (25 kB at 246 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.9/maven-monitor-2.0.9.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-project/2.0.9/maven-project-2.0.9.jar (122 kB at 1.2 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/1.0/maven-toolchain-1.0.jar&#xA;Progress (2): 29 kB | 4.1/37 kB&#xD;Progress (2): 29 kB | 7.4/37 kB&#xD;Progress (2): 29 kB | 12/37 kB &#xD;Progress (2): 29 kB | 16/37 kB&#xD;Progress (2): 29 kB | 20/37 kB&#xD;Progress (2): 29 kB | 24/37 kB&#xD;Progress (2): 29 kB | 28/37 kB&#xD;Progress (2): 29 kB | 32/37 kB&#xD;Progress (2): 29 kB | 36/37 kB&#xD;Progress (2): 29 kB | 37 kB   &#xD;Progress (3): 29 kB | 37 kB | 4.1/33 kB&#xD;Progress (3): 29 kB | 37 kB | 7.7/33 kB&#xD;Progress (3): 29 kB | 37 kB | 12/33 kB &#xD;Progress (3): 29 kB | 37 kB | 16/33 kB&#xD;Progress (3): 29 kB | 37 kB | 20/33 kB&#xD;Progress (3): 29 kB | 37 kB | 24/33 kB&#xD;Progress (3): 29 kB | 37 kB | 28/33 kB&#xD;Progress (3): 29 kB | 37 kB | 32/33 kB&#xD;Progress (3): 29 kB | 37 kB | 33 kB   &#xD;Progress (4): 29 kB | 37 kB | 33 kB | 4.1/10 kB&#xD;Progress (4): 29 kB | 37 kB | 33 kB | 7.7/10 kB&#xD;Progress (4): 29 kB | 37 kB | 33 kB | 10 kB    &#xD;Progress (5): 29 kB | 37 kB | 33 kB | 10 kB | 4.1/58 kB&#xD;Progress (5): 29 kB | 37 kB | 33 kB | 10 kB | 7.7/58 kB&#xD;Progress (5): 29 kB | 37 kB | 33 kB | 10 kB | 12/58 kB &#xD;Progress (5): 29 kB | 37 kB | 33 kB | 10 kB | 16/58 kB&#xD;Progress (5): 29 kB | 37 kB | 33 kB | 10 kB | 20/58 kB&#xD;Progress (5): 29 kB | 37 kB | 33 kB | 10 kB | 24/58 kB&#xD;Progress (5): 29 kB | 37 kB | 33 kB | 10 kB | 28/58 kB&#xD;Progress (5): 29 kB | 37 kB | 33 kB | 10 kB | 32/58 kB&#xD;Progress (5): 29 kB | 37 kB | 33 kB | 10 kB | 36/58 kB&#xD;Progress (5): 29 kB | 37 kB | 33 kB | 10 kB | 40/58 kB&#xD;Progress (5): 29 kB | 37 kB | 33 kB | 10 kB | 44/58 kB&#xD;Progress (5): 29 kB | 37 kB | 33 kB | 10 kB | 48/58 kB&#xD;Progress (5): 29 kB | 37 kB | 33 kB | 10 kB | 53/58 kB&#xD;Progress (5): 29 kB | 37 kB | 33 kB | 10 kB | 57/58 kB&#xD;Progress (5): 29 kB | 37 kB | 33 kB | 10 kB | 58 kB   &#xD;                                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-registry/2.0.9/maven-plugin-registry-2.0.9.jar (29 kB at 238 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/0.1/maven-shared-utils-0.1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-descriptor/2.0.9/maven-plugin-descriptor-2.0.9.jar (37 kB at 292 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/2.0.1/jsr305-2.0.1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/1.0/maven-toolchain-1.0.jar (33 kB at 247 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-incremental/1.1/maven-shared-incremental-1.1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-monitor/2.0.9/maven-monitor-2.0.9.jar (10 kB at 77 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/1.5.5/plexus-component-annotations-1.5.5.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact-manager/2.0.9/maven-artifact-manager-2.0.9.jar (58 kB at 399 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-api/2.2/plexus-compiler-api-2.2.jar&#xA;Progress (1): 4.1/155 kB&#xD;Progress (2): 4.1/155 kB | 4.1/14 kB&#xD;Progress (2): 7.7/155 kB | 4.1/14 kB&#xD;Progress (2): 7.7/155 kB | 7.7/14 kB&#xD;Progress (2): 12/155 kB | 7.7/14 kB &#xD;Progress (2): 12/155 kB | 12/14 kB &#xD;Progress (2): 16/155 kB | 12/14 kB&#xD;Progress (2): 16/155 kB | 14 kB   &#xD;Progress (2): 20/155 kB | 14 kB&#xD;Progress (2): 24/155 kB | 14 kB&#xD;Progress (2): 28/155 kB | 14 kB&#xD;Progress (2): 32/155 kB | 14 kB&#xD;Progress (2): 36/155 kB | 14 kB&#xD;Progress (2): 40/155 kB | 14 kB&#xD;Progress (2): 44/155 kB | 14 kB&#xD;Progress (2): 48/155 kB | 14 kB&#xD;Progress (2): 53/155 kB | 14 kB&#xD;Progress (2): 57/155 kB | 14 kB&#xD;Progress (3): 57/155 kB | 14 kB | 4.1/32 kB&#xD;Progress (3): 61/155 kB | 14 kB | 4.1/32 kB&#xD;Progress (3): 61/155 kB | 14 kB | 7.7/32 kB&#xD;Progress (3): 61/155 kB | 14 kB | 12/32 kB &#xD;Progress (3): 61/155 kB | 14 kB | 16/32 kB&#xD;Progress (3): 65/155 kB | 14 kB | 16/32 kB&#xD;Progress (3): 65/155 kB | 14 kB | 20/32 kB&#xD;Progress (3): 65/155 kB | 14 kB | 24/32 kB&#xD;Progress (3): 69/155 kB | 14 kB | 24/32 kB&#xD;Progress (3): 73/155 kB | 14 kB | 24/32 kB&#xD;Progress (3): 77/155 kB | 14 kB | 24/32 kB&#xD;Progress (3): 77/155 kB | 14 kB | 28/32 kB&#xD;Progress (3): 81/155 kB | 14 kB | 28/32 kB&#xD;Progress (3): 81/155 kB | 14 kB | 32 kB   &#xD;Progress (3): 85/155 kB | 14 kB | 32 kB&#xD;Progress (3): 89/155 kB | 14 kB | 32 kB&#xD;Progress (3): 93/155 kB | 14 kB | 32 kB&#xD;Progress (3): 98/155 kB | 14 kB | 32 kB&#xD;Progress (3): 102/155 kB | 14 kB | 32 kB&#xD;Progress (3): 106/155 kB | 14 kB | 32 kB&#xD;Progress (3): 110/155 kB | 14 kB | 32 kB&#xD;Progress (3): 114/155 kB | 14 kB | 32 kB&#xD;Progress (3): 118/155 kB | 14 kB | 32 kB&#xD;Progress (3): 122/155 kB | 14 kB | 32 kB&#xD;Progress (3): 126/155 kB | 14 kB | 32 kB&#xD;Progress (4): 126/155 kB | 14 kB | 32 kB | 4.1/4.2 kB&#xD;Progress (4): 130/155 kB | 14 kB | 32 kB | 4.1/4.2 kB&#xD;Progress (4): 130/155 kB | 14 kB | 32 kB | 4.2 kB    &#xD;Progress (4): 134/155 kB | 14 kB | 32 kB | 4.2 kB&#xD;Progress (4): 139/155 kB | 14 kB | 32 kB | 4.2 kB&#xD;Progress (4): 143/155 kB | 14 kB | 32 kB | 4.2 kB&#xD;Progress (4): 147/155 kB | 14 kB | 32 kB | 4.2 kB&#xD;Progress (4): 151/155 kB | 14 kB | 32 kB | 4.2 kB&#xD;Progress (4): 155 kB | 14 kB | 32 kB | 4.2 kB    &#xD;                                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-incremental/1.1/maven-shared-incremental-1.1.jar (14 kB at 85 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-manager/2.2/plexus-compiler-manager-2.2.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/1.5.5/plexus-component-annotations-1.5.5.jar (4.2 kB at 26 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-javac/2.2/plexus-compiler-javac-2.2.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/2.0.1/jsr305-2.0.1.jar (32 kB at 190 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.5.5/plexus-container-default-1.5.5.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/0.1/maven-shared-utils-0.1.jar (155 kB at 914 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.2/plexus-classworlds-2.2.2.jar&#xA;Progress (1): 4.1/25 kB&#xD;Progress (1): 7.7/25 kB&#xD;Progress (1): 12/25 kB &#xD;Progress (1): 16/25 kB&#xD;Progress (1): 20/25 kB&#xD;Progress (1): 24/25 kB&#xD;Progress (1): 25 kB   &#xD;Progress (2): 25 kB | 4.1/4.6 kB&#xD;Progress (2): 25 kB | 4.6 kB    &#xD;Progress (3): 25 kB | 4.6 kB | 4.1/19 kB&#xD;Progress (3): 25 kB | 4.6 kB | 7.7/19 kB&#xD;Progress (3): 25 kB | 4.6 kB | 12/19 kB &#xD;Progress (3): 25 kB | 4.6 kB | 16/19 kB&#xD;Progress (3): 25 kB | 4.6 kB | 19 kB   &#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 4.1/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 7.7/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 12/217 kB &#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 16/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 20/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 24/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 28/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 32/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 36/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 40/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 45/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 49/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 53/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 57/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 61/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 65/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 69/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 73/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 77/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 81/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 86/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 90/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 94/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 98/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 102/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 106/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 110/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 114/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 118/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 122/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 126/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 131/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 135/217 kB&#xD;Progress (4): 25 kB | 4.6 kB | 19 kB | 139/217 kB&#xD;                                                 &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-manager/2.2/plexus-compiler-manager-2.2.jar (4.6 kB at 24 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean-reflect/3.4/xbean-reflect-3.4.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-javac/2.2/plexus-compiler-javac-2.2.jar (19 kB at 99 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/log4j/log4j/1.2.12/log4j-1.2.12.jar&#xA;Progress (2): 25 kB | 143/217 kB&#xD;Progress (2): 25 kB | 147/217 kB&#xD;Progress (2): 25 kB | 151/217 kB&#xD;Progress (2): 25 kB | 155/217 kB&#xD;Progress (2): 25 kB | 159/217 kB&#xD;Progress (2): 25 kB | 163/217 kB&#xD;Progress (2): 25 kB | 167/217 kB&#xD;Progress (2): 25 kB | 172/217 kB&#xD;Progress (2): 25 kB | 176/217 kB&#xD;Progress (2): 25 kB | 180/217 kB&#xD;Progress (2): 25 kB | 184/217 kB&#xD;Progress (2): 25 kB | 188/217 kB&#xD;Progress (2): 25 kB | 192/217 kB&#xD;Progress (2): 25 kB | 196/217 kB&#xD;Progress (2): 25 kB | 200/217 kB&#xD;Progress (2): 25 kB | 204/217 kB&#xD;Progress (2): 25 kB | 208/217 kB&#xD;Progress (2): 25 kB | 213/217 kB&#xD;Progress (2): 25 kB | 217/217 kB&#xD;Progress (2): 25 kB | 217 kB    &#xD;Progress (3): 25 kB | 217 kB | 4.1/46 kB&#xD;Progress (3): 25 kB | 217 kB | 7.7/46 kB&#xD;Progress (3): 25 kB | 217 kB | 12/46 kB &#xD;Progress (3): 25 kB | 217 kB | 16/46 kB&#xD;Progress (3): 25 kB | 217 kB | 20/46 kB&#xD;Progress (3): 25 kB | 217 kB | 24/46 kB&#xD;Progress (3): 25 kB | 217 kB | 28/46 kB&#xD;Progress (3): 25 kB | 217 kB | 32/46 kB&#xD;Progress (3): 25 kB | 217 kB | 36/46 kB&#xD;Progress (3): 25 kB | 217 kB | 40/46 kB&#xD;Progress (3): 25 kB | 217 kB | 45/46 kB&#xD;Progress (3): 25 kB | 217 kB | 46 kB   &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-compiler-api/2.2/plexus-compiler-api-2.2.jar (25 kB at 125 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-logging/commons-logging-api/1.1/commons-logging-api-1.1.jar&#xA;Progress (3): 217 kB | 46 kB | 4.1/134 kB&#xD;Progress (3): 217 kB | 46 kB | 7.7/134 kB&#xD;Progress (3): 217 kB | 46 kB | 12/134 kB &#xD;Progress (3): 217 kB | 46 kB | 16/134 kB&#xD;Progress (3): 217 kB | 46 kB | 20/134 kB&#xD;Progress (3): 217 kB | 46 kB | 24/134 kB&#xD;Progress (3): 217 kB | 46 kB | 28/134 kB&#xD;Progress (4): 217 kB | 46 kB | 28/134 kB | 4.1/358 kB&#xD;Progress (4): 217 kB | 46 kB | 32/134 kB | 4.1/358 kB&#xD;Progress (4): 217 kB | 46 kB | 32/134 kB | 7.7/358 kB&#xD;Progress (4): 217 kB | 46 kB | 36/134 kB | 7.7/358 kB&#xD;Progress (4): 217 kB | 46 kB | 36/134 kB | 12/358 kB &#xD;Progress (4): 217 kB | 46 kB | 40/134 kB | 12/358 kB&#xD;Progress (4): 217 kB | 46 kB | 40/134 kB | 16/358 kB&#xD;Progress (4): 217 kB | 46 kB | 45/134 kB | 16/358 kB&#xD;Progress (4): 217 kB | 46 kB | 45/134 kB | 20/358 kB&#xD;Progress (4): 217 kB | 46 kB | 49/134 kB | 20/358 kB&#xD;Progress (4): 217 kB | 46 kB | 49/134 kB | 24/358 kB&#xD;Progress (4): 217 kB | 46 kB | 53/134 kB | 24/358 kB&#xD;Progress (4): 217 kB | 46 kB | 53/134 kB | 28/358 kB&#xD;Progress (4): 217 kB | 46 kB | 57/134 kB | 28/358 kB&#xD;Progress (4): 217 kB | 46 kB | 61/134 kB | 28/358 kB&#xD;Progress (4): 217 kB | 46 kB | 61/134 kB | 32/358 kB&#xD;Progress (4): 217 kB | 46 kB | 61/134 kB | 36/358 kB&#xD;Progress (4): 217 kB | 46 kB | 65/134 kB | 36/358 kB&#xD;Progress (4): 217 kB | 46 kB | 65/134 kB | 40/358 kB&#xD;Progress (4): 217 kB | 46 kB | 69/134 kB | 40/358 kB&#xD;Progress (4): 217 kB | 46 kB | 69/134 kB | 45/358 kB&#xD;Progress (4): 217 kB | 46 kB | 73/134 kB | 45/358 kB&#xD;Progress (4): 217 kB | 46 kB | 77/134 kB | 45/358 kB&#xD;Progress (4): 217 kB | 46 kB | 77/134 kB | 49/358 kB&#xD;Progress (4): 217 kB | 46 kB | 77/134 kB | 53/358 kB&#xD;Progress (4): 217 kB | 46 kB | 81/134 kB | 53/358 kB&#xD;Progress (4): 217 kB | 46 kB | 81/134 kB | 57/358 kB&#xD;Progress (4): 217 kB | 46 kB | 86/134 kB | 57/358 kB&#xD;Progress (4): 217 kB | 46 kB | 86/134 kB | 61/358 kB&#xD;Progress (4): 217 kB | 46 kB | 90/134 kB | 61/358 kB&#xD;Progress (4): 217 kB | 46 kB | 94/134 kB | 61/358 kB&#xD;Progress (4): 217 kB | 46 kB | 94/134 kB | 65/358 kB&#xD;Progress (4): 217 kB | 46 kB | 94/134 kB | 69/358 kB&#xD;Progress (4): 217 kB | 46 kB | 98/134 kB | 69/358 kB&#xD;Progress (4): 217 kB | 46 kB | 98/134 kB | 73/358 kB&#xD;Progress (4): 217 kB | 46 kB | 102/134 kB | 73/358 kB&#xD;Progress (4): 217 kB | 46 kB | 102/134 kB | 77/358 kB&#xD;Progress (4): 217 kB | 46 kB | 106/134 kB | 77/358 kB&#xD;Progress (4): 217 kB | 46 kB | 106/134 kB | 81/358 kB&#xD;Progress (4): 217 kB | 46 kB | 110/134 kB | 81/358 kB&#xD;Progress (4): 217 kB | 46 kB | 110/134 kB | 86/358 kB&#xD;Progress (4): 217 kB | 46 kB | 110/134 kB | 90/358 kB&#xD;Progress (4): 217 kB | 46 kB | 110/134 kB | 94/358 kB&#xD;Progress (4): 217 kB | 46 kB | 110/134 kB | 98/358 kB&#xD;Progress (4): 217 kB | 46 kB | 114/134 kB | 98/358 kB&#xD;                                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.5.5/plexus-container-default-1.5.5.jar (217 kB at 1.0 MB/s)&#xA;Progress (3): 46 kB | 114/134 kB | 102/358 kB&#xD;Progress (3): 46 kB | 118/134 kB | 102/358 kB&#xD;Progress (3): 46 kB | 118/134 kB | 106/358 kB&#xD;Progress (3): 46 kB | 122/134 kB | 106/358 kB&#xD;                                             &#xD;Downloading from central: https://repo.maven.apache.org/maven2/com/google/collections/google-collections/1.0/google-collections-1.0.jar&#xA;Progress (3): 46 kB | 126/134 kB | 106/358 kB&#xD;Progress (3): 46 kB | 126/134 kB | 110/358 kB&#xD;Progress (3): 46 kB | 126/134 kB | 114/358 kB&#xD;Progress (3): 46 kB | 131/134 kB | 114/358 kB&#xD;Progress (3): 46 kB | 134 kB | 114/358 kB    &#xD;Progress (3): 46 kB | 134 kB | 118/358 kB&#xD;Progress (3): 46 kB | 134 kB | 122/358 kB&#xD;Progress (3): 46 kB | 134 kB | 126/358 kB&#xD;Progress (3): 46 kB | 134 kB | 131/358 kB&#xD;Progress (3): 46 kB | 134 kB | 135/358 kB&#xD;Progress (3): 46 kB | 134 kB | 139/358 kB&#xD;Progress (3): 46 kB | 134 kB | 143/358 kB&#xD;Progress (3): 46 kB | 134 kB | 147/358 kB&#xD;Progress (3): 46 kB | 134 kB | 151/358 kB&#xD;Progress (3): 46 kB | 134 kB | 155/358 kB&#xD;Progress (3): 46 kB | 134 kB | 159/358 kB&#xD;Progress (3): 46 kB | 134 kB | 163/358 kB&#xD;Progress (3): 46 kB | 134 kB | 167/358 kB&#xD;Progress (3): 46 kB | 134 kB | 172/358 kB&#xD;Progress (3): 46 kB | 134 kB | 176/358 kB&#xD;Progress (3): 46 kB | 134 kB | 180/358 kB&#xD;Progress (3): 46 kB | 134 kB | 184/358 kB&#xD;Progress (3): 46 kB | 134 kB | 188/358 kB&#xD;Progress (3): 46 kB | 134 kB | 192/358 kB&#xD;Progress (3): 46 kB | 134 kB | 196/358 kB&#xD;Progress (3): 46 kB | 134 kB | 200/358 kB&#xD;Progress (3): 46 kB | 134 kB | 204/358 kB&#xD;Progress (3): 46 kB | 134 kB | 208/358 kB&#xD;Progress (3): 46 kB | 134 kB | 213/358 kB&#xD;Progress (3): 46 kB | 134 kB | 217/358 kB&#xD;Progress (3): 46 kB | 134 kB | 221/358 kB&#xD;Progress (3): 46 kB | 134 kB | 225/358 kB&#xD;Progress (3): 46 kB | 134 kB | 229/358 kB&#xD;Progress (3): 46 kB | 134 kB | 233/358 kB&#xD;Progress (3): 46 kB | 134 kB | 237/358 kB&#xD;Progress (3): 46 kB | 134 kB | 241/358 kB&#xD;Progress (3): 46 kB | 134 kB | 245/358 kB&#xD;Progress (3): 46 kB | 134 kB | 249/358 kB&#xD;Progress (3): 46 kB | 134 kB | 253/358 kB&#xD;Progress (3): 46 kB | 134 kB | 258/358 kB&#xD;Progress (3): 46 kB | 134 kB | 262/358 kB&#xD;Progress (3): 46 kB | 134 kB | 266/358 kB&#xD;Progress (3): 46 kB | 134 kB | 270/358 kB&#xD;Progress (3): 46 kB | 134 kB | 274/358 kB&#xD;Progress (3): 46 kB | 134 kB | 278/358 kB&#xD;Progress (3): 46 kB | 134 kB | 282/358 kB&#xD;Progress (3): 46 kB | 134 kB | 286/358 kB&#xD;Progress (3): 46 kB | 134 kB | 290/358 kB&#xD;Progress (3): 46 kB | 134 kB | 294/358 kB&#xD;Progress (3): 46 kB | 134 kB | 299/358 kB&#xD;Progress (3): 46 kB | 134 kB | 303/358 kB&#xD;Progress (3): 46 kB | 134 kB | 307/358 kB&#xD;Progress (3): 46 kB | 134 kB | 311/358 kB&#xD;Progress (3): 46 kB | 134 kB | 315/358 kB&#xD;Progress (3): 46 kB | 134 kB | 319/358 kB&#xD;Progress (3): 46 kB | 134 kB | 323/358 kB&#xD;Progress (3): 46 kB | 134 kB | 327/358 kB&#xD;Progress (3): 46 kB | 134 kB | 331/358 kB&#xD;Progress (3): 46 kB | 134 kB | 335/358 kB&#xD;Progress (3): 46 kB | 134 kB | 339/358 kB&#xD;Progress (3): 46 kB | 134 kB | 344/358 kB&#xD;Progress (3): 46 kB | 134 kB | 348/358 kB&#xD;Progress (3): 46 kB | 134 kB | 352/358 kB&#xD;Progress (3): 46 kB | 134 kB | 356/358 kB&#xD;Progress (3): 46 kB | 134 kB | 358 kB    &#xD;                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.2/plexus-classworlds-2.2.2.jar (46 kB at 203 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.2/junit-3.8.2.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/log4j/log4j/1.2.12/log4j-1.2.12.jar (358 kB at 1.6 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/xbean/xbean-reflect/3.4/xbean-reflect-3.4.jar (134 kB at 584 kB/s)&#xA;Progress (1): 4.1/45 kB&#xD;Progress (1): 7.7/45 kB&#xD;Progress (1): 12/45 kB &#xD;Progress (1): 16/45 kB&#xD;Progress (1): 20/45 kB&#xD;Progress (1): 24/45 kB&#xD;Progress (1): 28/45 kB&#xD;Progress (1): 32/45 kB&#xD;Progress (1): 36/45 kB&#xD;Progress (1): 40/45 kB&#xD;Progress (1): 44/45 kB&#xD;Progress (1): 45 kB   &#xD;Progress (2): 45 kB | 4.1/640 kB&#xD;Progress (2): 45 kB | 7.7/640 kB&#xD;Progress (2): 45 kB | 12/640 kB &#xD;Progress (2): 45 kB | 16/640 kB&#xD;Progress (2): 45 kB | 20/640 kB&#xD;Progress (2): 45 kB | 24/640 kB&#xD;Progress (2): 45 kB | 28/640 kB&#xD;Progress (2): 45 kB | 32/640 kB&#xD;Progress (2): 45 kB | 36/640 kB&#xD;Progress (2): 45 kB | 40/640 kB&#xD;Progress (2): 45 kB | 45/640 kB&#xD;Progress (2): 45 kB | 49/640 kB&#xD;Progress (2): 45 kB | 53/640 kB&#xD;Progress (2): 45 kB | 57/640 kB&#xD;Progress (2): 45 kB | 61/640 kB&#xD;Progress (2): 45 kB | 65/640 kB&#xD;Progress (2): 45 kB | 69/640 kB&#xD;Progress (2): 45 kB | 73/640 kB&#xD;Progress (2): 45 kB | 77/640 kB&#xD;Progress (2): 45 kB | 81/640 kB&#xD;Progress (2): 45 kB | 86/640 kB&#xD;Progress (2): 45 kB | 90/640 kB&#xD;Progress (2): 45 kB | 94/640 kB&#xD;Progress (2): 45 kB | 98/640 kB&#xD;Progress (2): 45 kB | 102/640 kB&#xD;Progress (2): 45 kB | 106/640 kB&#xD;Progress (2): 45 kB | 110/640 kB&#xD;Progress (2): 45 kB | 114/640 kB&#xD;Progress (2): 45 kB | 118/640 kB&#xD;Progress (2): 45 kB | 122/640 kB&#xD;Progress (2): 45 kB | 126/640 kB&#xD;Progress (2): 45 kB | 131/640 kB&#xD;Progress (2): 45 kB | 135/640 kB&#xD;Progress (2): 45 kB | 139/640 kB&#xD;Progress (2): 45 kB | 143/640 kB&#xD;Progress (2): 45 kB | 147/640 kB&#xD;Progress (2): 45 kB | 151/640 kB&#xD;Progress (2): 45 kB | 155/640 kB&#xD;Progress (2): 45 kB | 159/640 kB&#xD;Progress (2): 45 kB | 163/640 kB&#xD;Progress (2): 45 kB | 167/640 kB&#xD;Progress (2): 45 kB | 172/640 kB&#xD;Progress (2): 45 kB | 176/640 kB&#xD;Progress (2): 45 kB | 180/640 kB&#xD;Progress (2): 45 kB | 184/640 kB&#xD;Progress (2): 45 kB | 188/640 kB&#xD;Progress (2): 45 kB | 192/640 kB&#xD;Progress (2): 45 kB | 196/640 kB&#xD;Progress (2): 45 kB | 200/640 kB&#xD;Progress (2): 45 kB | 204/640 kB&#xD;Progress (2): 45 kB | 208/640 kB&#xD;Progress (2): 45 kB | 213/640 kB&#xD;Progress (2): 45 kB | 217/640 kB&#xD;Progress (2): 45 kB | 221/640 kB&#xD;Progress (2): 45 kB | 225/640 kB&#xD;Progress (2): 45 kB | 229/640 kB&#xD;Progress (2): 45 kB | 233/640 kB&#xD;Progress (2): 45 kB | 237/640 kB&#xD;Progress (2): 45 kB | 241/640 kB&#xD;Progress (2): 45 kB | 245/640 kB&#xD;Progress (2): 45 kB | 249/640 kB&#xD;Progress (2): 45 kB | 253/640 kB&#xD;Progress (2): 45 kB | 258/640 kB&#xD;Progress (2): 45 kB | 262/640 kB&#xD;Progress (2): 45 kB | 266/640 kB&#xD;Progress (2): 45 kB | 270/640 kB&#xD;Progress (2): 45 kB | 274/640 kB&#xD;Progress (2): 45 kB | 278/640 kB&#xD;Progress (2): 45 kB | 282/640 kB&#xD;Progress (2): 45 kB | 286/640 kB&#xD;Progress (2): 45 kB | 290/640 kB&#xD;Progress (2): 45 kB | 294/640 kB&#xD;Progress (2): 45 kB | 298/640 kB&#xD;Progress (2): 45 kB | 302/640 kB&#xD;Progress (2): 45 kB | 306/640 kB&#xD;Progress (2): 45 kB | 310/640 kB&#xD;Progress (2): 45 kB | 314/640 kB&#xD;Progress (2): 45 kB | 319/640 kB&#xD;Progress (2): 45 kB | 323/640 kB&#xD;Progress (2): 45 kB | 327/640 kB&#xD;Progress (2): 45 kB | 331/640 kB&#xD;Progress (2): 45 kB | 335/640 kB&#xD;Progress (2): 45 kB | 339/640 kB&#xD;Progress (2): 45 kB | 343/640 kB&#xD;Progress (2): 45 kB | 347/640 kB&#xD;Progress (2): 45 kB | 351/640 kB&#xD;Progress (2): 45 kB | 355/640 kB&#xD;Progress (2): 45 kB | 359/640 kB&#xD;Progress (2): 45 kB | 364/640 kB&#xD;Progress (2): 45 kB | 368/640 kB&#xD;Progress (2): 45 kB | 372/640 kB&#xD;Progress (2): 45 kB | 376/640 kB&#xD;Progress (2): 45 kB | 380/640 kB&#xD;Progress (2): 45 kB | 384/640 kB&#xD;Progress (2): 45 kB | 388/640 kB&#xD;Progress (2): 45 kB | 392/640 kB&#xD;Progress (2): 45 kB | 396/640 kB&#xD;Progress (2): 45 kB | 400/640 kB&#xD;Progress (2): 45 kB | 405/640 kB&#xD;Progress (2): 45 kB | 409/640 kB&#xD;Progress (2): 45 kB | 413/640 kB&#xD;Progress (2): 45 kB | 417/640 kB&#xD;Progress (2): 45 kB | 421/640 kB&#xD;Progress (2): 45 kB | 425/640 kB&#xD;Progress (2): 45 kB | 429/640 kB&#xD;Progress (2): 45 kB | 433/640 kB&#xD;Progress (2): 45 kB | 437/640 kB&#xD;Progress (2): 45 kB | 441/640 kB&#xD;Progress (2): 45 kB | 446/640 kB&#xD;Progress (2): 45 kB | 450/640 kB&#xD;Progress (2): 45 kB | 454/640 kB&#xD;Progress (2): 45 kB | 458/640 kB&#xD;Progress (2): 45 kB | 462/640 kB&#xD;Progress (2): 45 kB | 466/640 kB&#xD;Progress (2): 45 kB | 470/640 kB&#xD;Progress (2): 45 kB | 474/640 kB&#xD;Progress (2): 45 kB | 478/640 kB&#xD;Progress (2): 45 kB | 482/640 kB&#xD;Progress (2): 45 kB | 486/640 kB&#xD;Progress (2): 45 kB | 491/640 kB&#xD;Progress (2): 45 kB | 495/640 kB&#xD;Progress (2): 45 kB | 499/640 kB&#xD;Progress (2): 45 kB | 503/640 kB&#xD;Progress (2): 45 kB | 507/640 kB&#xD;Progress (2): 45 kB | 511/640 kB&#xD;Progress (2): 45 kB | 515/640 kB&#xD;Progress (2): 45 kB | 519/640 kB&#xD;Progress (2): 45 kB | 523/640 kB&#xD;Progress (2): 45 kB | 527/640 kB&#xD;Progress (2): 45 kB | 532/640 kB&#xD;Progress (2): 45 kB | 536/640 kB&#xD;Progress (2): 45 kB | 540/640 kB&#xD;Progress (2): 45 kB | 544/640 kB&#xD;Progress (3): 45 kB | 544/640 kB | 4.1/121 kB&#xD;Progress (3): 45 kB | 548/640 kB | 4.1/121 kB&#xD;Progress (3): 45 kB | 552/640 kB | 4.1/121 kB&#xD;Progress (3): 45 kB | 552/640 kB | 7.7/121 kB&#xD;Progress (3): 45 kB | 556/640 kB | 7.7/121 kB&#xD;Progress (3): 45 kB | 556/640 kB | 12/121 kB &#xD;Progress (3): 45 kB | 556/640 kB | 16/121 kB&#xD;Progress (3): 45 kB | 560/640 kB | 16/121 kB&#xD;Progress (3): 45 kB | 564/640 kB | 16/121 kB&#xD;Progress (3): 45 kB | 564/640 kB | 20/121 kB&#xD;Progress (3): 45 kB | 568/640 kB | 20/121 kB&#xD;Progress (3): 45 kB | 568/640 kB | 24/121 kB&#xD;Progress (3): 45 kB | 572/640 kB | 24/121 kB&#xD;Progress (3): 45 kB | 577/640 kB | 24/121 kB&#xD;Progress (3): 45 kB | 577/640 kB | 28/121 kB&#xD;Progress (3): 45 kB | 581/640 kB | 28/121 kB&#xD;Progress (3): 45 kB | 581/640 kB | 32/121 kB&#xD;Progress (3): 45 kB | 585/640 kB | 32/121 kB&#xD;Progress (3): 45 kB | 585/640 kB | 36/121 kB&#xD;Progress (3): 45 kB | 589/640 kB | 36/121 kB&#xD;Progress (3): 45 kB | 589/640 kB | 40/121 kB&#xD;Progress (3): 45 kB | 593/640 kB | 40/121 kB&#xD;Progress (3): 45 kB | 593/640 kB | 45/121 kB&#xD;Progress (3): 45 kB | 597/640 kB | 45/121 kB&#xD;Progress (3): 45 kB | 597/640 kB | 49/121 kB&#xD;Progress (3): 45 kB | 601/640 kB | 49/121 kB&#xD;Progress (3): 45 kB | 601/640 kB | 53/121 kB&#xD;Progress (3): 45 kB | 605/640 kB | 53/121 kB&#xD;Progress (3): 45 kB | 605/640 kB | 57/121 kB&#xD;Progress (3): 45 kB | 609/640 kB | 57/121 kB&#xD;Progress (3): 45 kB | 609/640 kB | 61/121 kB&#xD;Progress (3): 45 kB | 613/640 kB | 61/121 kB&#xD;Progress (3): 45 kB | 613/640 kB | 65/121 kB&#xD;Progress (3): 45 kB | 618/640 kB | 65/121 kB&#xD;Progress (3): 45 kB | 618/640 kB | 69/121 kB&#xD;Progress (3): 45 kB | 622/640 kB | 69/121 kB&#xD;Progress (3): 45 kB | 622/640 kB | 73/121 kB&#xD;Progress (3): 45 kB | 626/640 kB | 73/121 kB&#xD;Progress (3): 45 kB | 630/640 kB | 73/121 kB&#xD;Progress (3): 45 kB | 630/640 kB | 77/121 kB&#xD;Progress (3): 45 kB | 634/640 kB | 77/121 kB&#xD;Progress (3): 45 kB | 634/640 kB | 81/121 kB&#xD;Progress (3): 45 kB | 638/640 kB | 81/121 kB&#xD;Progress (3): 45 kB | 638/640 kB | 86/121 kB&#xD;Progress (3): 45 kB | 638/640 kB | 90/121 kB&#xD;Progress (3): 45 kB | 640 kB | 90/121 kB    &#xD;Progress (3): 45 kB | 640 kB | 94/121 kB&#xD;Progress (3): 45 kB | 640 kB | 98/121 kB&#xD;Progress (3): 45 kB | 640 kB | 102/121 kB&#xD;Progress (3): 45 kB | 640 kB | 106/121 kB&#xD;Progress (3): 45 kB | 640 kB | 110/121 kB&#xD;Progress (3): 45 kB | 640 kB | 114/121 kB&#xD;Progress (3): 45 kB | 640 kB | 118/121 kB&#xD;Progress (3): 45 kB | 640 kB | 121 kB    &#xD;                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-logging/commons-logging-api/1.1/commons-logging-api-1.1.jar (45 kB at 178 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/junit/junit/3.8.2/junit-3.8.2.jar (121 kB at 469 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/collections/google-collections/1.0/google-collections-1.0.jar (640 kB at 2.5 MB/s)&#xA;[INFO] Changes detected - recompiling the module!&#xA;[WARNING] File encoding has not been set, using platform encoding UTF-8, i.e. build is platform dependent!&#xA;[INFO] Compiling 1 source file to /work/target/classes&#xA;[INFO] &#xA;[INFO] --- maven-resources-plugin:2.6:testResources (default-testResources) @ simple-java-project ---&#xA;[WARNING] Using platform encoding (UTF-8 actually) to copy filtered resources, i.e. build is platform dependent!&#xA;[INFO] skip non existing resourceDirectory /work/src/test/resources&#xA;[INFO] &#xA;[INFO] --- maven-compiler-plugin:3.1:testCompile (default-testCompile) @ simple-java-project ---&#xA;[INFO] No sources to compile&#xA;[INFO] &#xA;[INFO] --- maven-surefire-plugin:2.12.4:test (default-test) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-booter/2.12.4/surefire-booter-2.12.4.pom&#xA;Progress (1): 3.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-booter/2.12.4/surefire-booter-2.12.4.pom (3.0 kB at 55 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-api/2.12.4/surefire-api-2.12.4.pom&#xA;Progress (1): 2.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-api/2.12.4/surefire-api-2.12.4.pom (2.5 kB at 39 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/maven-surefire-common/2.12.4/maven-surefire-common-2.12.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/maven-surefire-common/2.12.4/maven-surefire-common-2.12.4.pom (5.5 kB at 142 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-annotations/3.1/maven-plugin-annotations-3.1.pom&#xA;Progress (1): 1.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-annotations/3.1/maven-plugin-annotations-3.1.pom (1.6 kB at 42 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-tools/3.1/maven-plugin-tools-3.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-tools/3.1/maven-plugin-tools-3.1.pom (16 kB at 437 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.9/maven-reporting-api-2.0.9.pom&#xA;Progress (1): 1.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.9/maven-reporting-api-2.0.9.pom (1.8 kB at 55 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting/2.0.9/maven-reporting-2.0.9.pom&#xA;Progress (1): 1.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting/2.0.9/maven-reporting-2.0.9.pom (1.5 kB at 37 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/2.0.9/maven-toolchain-2.0.9.pom&#xA;Progress (1): 3.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/2.0.9/maven-toolchain-2.0.9.pom (3.5 kB at 116 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.1/commons-lang3-3.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 17 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.1/commons-lang3-3.1.pom (17 kB at 363 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/22/commons-parent-22.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 42 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/22/commons-parent-22.pom (42 kB at 838 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/9/apache-9.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/9/apache-9.pom (15 kB at 433 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/1.3/maven-common-artifact-filters-1.3.pom&#xA;Progress (1): 3.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/1.3/maven-common-artifact-filters-1.3.pom (3.7 kB at 106 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/12/maven-shared-components-12.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 9.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/12/maven-shared-components-12.pom (9.3 kB at 275 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/13/maven-parent-13.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 23 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/13/maven-parent-13.pom (23 kB at 754 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/6/apache-6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 13 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/6/apache-6.pom (13 kB at 355 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9/plexus-container-default-1.0-alpha-9.pom&#xA;Progress (1): 1.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-container-default/1.0-alpha-9/plexus-container-default-1.0-alpha-9.pom (1.2 kB at 40 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-booter/2.12.4/surefire-booter-2.12.4.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-api/2.12.4/surefire-api-2.12.4.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/maven-surefire-common/2.12.4/maven-surefire-common-2.12.4.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.1/commons-lang3-3.1.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/1.3/maven-common-artifact-filters-1.3.jar&#xA;Progress (1): 4.1/35 kB&#xD;Progress (2): 4.1/35 kB | 4.1/316 kB&#xD;Progress (2): 7.7/35 kB | 4.1/316 kB&#xD;Progress (2): 7.7/35 kB | 7.7/316 kB&#xD;Progress (2): 12/35 kB | 7.7/316 kB &#xD;Progress (2): 12/35 kB | 12/316 kB &#xD;Progress (2): 16/35 kB | 12/316 kB&#xD;Progress (3): 16/35 kB | 12/316 kB | 4.1/118 kB&#xD;Progress (3): 16/35 kB | 16/316 kB | 4.1/118 kB&#xD;Progress (3): 20/35 kB | 16/316 kB | 4.1/118 kB&#xD;Progress (3): 24/35 kB | 16/316 kB | 4.1/118 kB&#xD;Progress (3): 28/35 kB | 16/316 kB | 4.1/118 kB&#xD;Progress (3): 28/35 kB | 20/316 kB | 4.1/118 kB&#xD;Progress (3): 32/35 kB | 20/316 kB | 4.1/118 kB&#xD;Progress (3): 32/35 kB | 24/316 kB | 4.1/118 kB&#xD;Progress (3): 32/35 kB | 24/316 kB | 7.7/118 kB&#xD;Progress (3): 32/35 kB | 28/316 kB | 7.7/118 kB&#xD;Progress (3): 35 kB | 28/316 kB | 7.7/118 kB   &#xD;Progress (3): 35 kB | 32/316 kB | 7.7/118 kB&#xD;Progress (3): 35 kB | 32/316 kB | 12/118 kB &#xD;Progress (3): 35 kB | 36/316 kB | 12/118 kB&#xD;Progress (3): 35 kB | 36/316 kB | 16/118 kB&#xD;Progress (3): 35 kB | 40/316 kB | 16/118 kB&#xD;Progress (3): 35 kB | 40/316 kB | 20/118 kB&#xD;Progress (3): 35 kB | 45/316 kB | 20/118 kB&#xD;Progress (3): 35 kB | 45/316 kB | 24/118 kB&#xD;Progress (3): 35 kB | 49/316 kB | 24/118 kB&#xD;Progress (3): 35 kB | 49/316 kB | 28/118 kB&#xD;Progress (3): 35 kB | 53/316 kB | 28/118 kB&#xD;Progress (3): 35 kB | 53/316 kB | 32/118 kB&#xD;Progress (3): 35 kB | 57/316 kB | 32/118 kB&#xD;Progress (3): 35 kB | 57/316 kB | 36/118 kB&#xD;Progress (3): 35 kB | 57/316 kB | 40/118 kB&#xD;Progress (3): 35 kB | 57/316 kB | 45/118 kB&#xD;Progress (3): 35 kB | 57/316 kB | 49/118 kB&#xD;Progress (3): 35 kB | 57/316 kB | 53/118 kB&#xD;Progress (3): 35 kB | 61/316 kB | 53/118 kB&#xD;Progress (3): 35 kB | 61/316 kB | 57/118 kB&#xD;Progress (3): 35 kB | 65/316 kB | 57/118 kB&#xD;Progress (3): 35 kB | 69/316 kB | 57/118 kB&#xD;Progress (3): 35 kB | 73/316 kB | 57/118 kB&#xD;Progress (3): 35 kB | 73/316 kB | 61/118 kB&#xD;Progress (3): 35 kB | 73/316 kB | 65/118 kB&#xD;Progress (3): 35 kB | 73/316 kB | 69/118 kB&#xD;Progress (3): 35 kB | 73/316 kB | 73/118 kB&#xD;Progress (3): 35 kB | 73/316 kB | 77/118 kB&#xD;Progress (3): 35 kB | 73/316 kB | 81/118 kB&#xD;Progress (3): 35 kB | 73/316 kB | 86/118 kB&#xD;Progress (3): 35 kB | 73/316 kB | 90/118 kB&#xD;Progress (3): 35 kB | 73/316 kB | 94/118 kB&#xD;Progress (3): 35 kB | 73/316 kB | 98/118 kB&#xD;Progress (3): 35 kB | 73/316 kB | 102/118 kB&#xD;Progress (3): 35 kB | 73/316 kB | 106/118 kB&#xD;Progress (3): 35 kB | 73/316 kB | 110/118 kB&#xD;Progress (3): 35 kB | 73/316 kB | 114/118 kB&#xD;Progress (3): 35 kB | 77/316 kB | 114/118 kB&#xD;Progress (3): 35 kB | 77/316 kB | 118 kB    &#xD;Progress (3): 35 kB | 81/316 kB | 118 kB&#xD;Progress (3): 35 kB | 86/316 kB | 118 kB&#xD;Progress (3): 35 kB | 90/316 kB | 118 kB&#xD;Progress (3): 35 kB | 94/316 kB | 118 kB&#xD;Progress (3): 35 kB | 98/316 kB | 118 kB&#xD;Progress (3): 35 kB | 102/316 kB | 118 kB&#xD;Progress (3): 35 kB | 106/316 kB | 118 kB&#xD;Progress (3): 35 kB | 110/316 kB | 118 kB&#xD;Progress (3): 35 kB | 114/316 kB | 118 kB&#xD;Progress (3): 35 kB | 118/316 kB | 118 kB&#xD;Progress (3): 35 kB | 122/316 kB | 118 kB&#xD;Progress (3): 35 kB | 126/316 kB | 118 kB&#xD;Progress (3): 35 kB | 131/316 kB | 118 kB&#xD;Progress (3): 35 kB | 135/316 kB | 118 kB&#xD;Progress (3): 35 kB | 139/316 kB | 118 kB&#xD;Progress (3): 35 kB | 143/316 kB | 118 kB&#xD;Progress (3): 35 kB | 147/316 kB | 118 kB&#xD;Progress (3): 35 kB | 151/316 kB | 118 kB&#xD;Progress (3): 35 kB | 155/316 kB | 118 kB&#xD;Progress (3): 35 kB | 159/316 kB | 118 kB&#xD;Progress (3): 35 kB | 163/316 kB | 118 kB&#xD;Progress (3): 35 kB | 167/316 kB | 118 kB&#xD;Progress (3): 35 kB | 172/316 kB | 118 kB&#xD;Progress (3): 35 kB | 176/316 kB | 118 kB&#xD;Progress (3): 35 kB | 180/316 kB | 118 kB&#xD;Progress (3): 35 kB | 184/316 kB | 118 kB&#xD;Progress (3): 35 kB | 188/316 kB | 118 kB&#xD;Progress (3): 35 kB | 192/316 kB | 118 kB&#xD;Progress (3): 35 kB | 196/316 kB | 118 kB&#xD;Progress (3): 35 kB | 200/316 kB | 118 kB&#xD;Progress (3): 35 kB | 204/316 kB | 118 kB&#xD;Progress (3): 35 kB | 208/316 kB | 118 kB&#xD;Progress (3): 35 kB | 213/316 kB | 118 kB&#xD;Progress (3): 35 kB | 217/316 kB | 118 kB&#xD;Progress (3): 35 kB | 221/316 kB | 118 kB&#xD;Progress (3): 35 kB | 225/316 kB | 118 kB&#xD;Progress (3): 35 kB | 229/316 kB | 118 kB&#xD;Progress (3): 35 kB | 233/316 kB | 118 kB&#xD;Progress (3): 35 kB | 237/316 kB | 118 kB&#xD;Progress (3): 35 kB | 241/316 kB | 118 kB&#xD;Progress (3): 35 kB | 245/316 kB | 118 kB&#xD;Progress (3): 35 kB | 249/316 kB | 118 kB&#xD;Progress (3): 35 kB | 253/316 kB | 118 kB&#xD;Progress (3): 35 kB | 258/316 kB | 118 kB&#xD;Progress (3): 35 kB | 262/316 kB | 118 kB&#xD;Progress (3): 35 kB | 266/316 kB | 118 kB&#xD;Progress (3): 35 kB | 270/316 kB | 118 kB&#xD;Progress (3): 35 kB | 274/316 kB | 118 kB&#xD;Progress (3): 35 kB | 278/316 kB | 118 kB&#xD;Progress (3): 35 kB | 282/316 kB | 118 kB&#xD;Progress (3): 35 kB | 286/316 kB | 118 kB&#xD;Progress (3): 35 kB | 290/316 kB | 118 kB&#xD;Progress (3): 35 kB | 294/316 kB | 118 kB&#xD;Progress (3): 35 kB | 299/316 kB | 118 kB&#xD;Progress (3): 35 kB | 303/316 kB | 118 kB&#xD;Progress (3): 35 kB | 307/316 kB | 118 kB&#xD;Progress (3): 35 kB | 311/316 kB | 118 kB&#xD;Progress (3): 35 kB | 315/316 kB | 118 kB&#xD;Progress (3): 35 kB | 316 kB | 118 kB    &#xD;Progress (4): 35 kB | 316 kB | 118 kB | 4.1/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 7.7/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 12/263 kB &#xD;Progress (4): 35 kB | 316 kB | 118 kB | 16/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 20/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 24/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 28/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 32/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 36/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 40/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 45/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 49/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 53/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 57/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 61/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 65/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 69/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 73/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 77/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 81/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 85/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 89/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 93/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 98/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 102/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 106/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 110/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 114/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 118/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 122/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 126/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 130/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 134/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 139/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 143/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 147/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 151/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 155/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 159/263 kB&#xD;Progress (4): 35 kB | 316 kB | 118 kB | 163/263 kB&#xD;Progress (5): 35 kB | 316 kB | 118 kB | 163/263 kB | 4.1/31 kB&#xD;                                                              &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-booter/2.12.4/surefire-booter-2.12.4.jar (35 kB at 991 kB/s)&#xA;Progress (4): 316 kB | 118 kB | 163/263 kB | 7.5/31 kB&#xD;Progress (4): 316 kB | 118 kB | 167/263 kB | 7.5/31 kB&#xD;                                                      &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0.8/plexus-utils-3.0.8.jar&#xA;Progress (4): 316 kB | 118 kB | 171/263 kB | 7.5/31 kB&#xD;Progress (4): 316 kB | 118 kB | 171/263 kB | 12/31 kB &#xD;Progress (4): 316 kB | 118 kB | 175/263 kB | 12/31 kB&#xD;Progress (4): 316 kB | 118 kB | 175/263 kB | 16/31 kB&#xD;Progress (4): 316 kB | 118 kB | 179/263 kB | 16/31 kB&#xD;Progress (4): 316 kB | 118 kB | 179/263 kB | 20/31 kB&#xD;Progress (4): 316 kB | 118 kB | 184/263 kB | 20/31 kB&#xD;Progress (4): 316 kB | 118 kB | 184/263 kB | 24/31 kB&#xD;Progress (4): 316 kB | 118 kB | 188/263 kB | 24/31 kB&#xD;Progress (4): 316 kB | 118 kB | 188/263 kB | 28/31 kB&#xD;Progress (4): 316 kB | 118 kB | 192/263 kB | 28/31 kB&#xD;Progress (4): 316 kB | 118 kB | 192/263 kB | 31 kB   &#xD;Progress (4): 316 kB | 118 kB | 196/263 kB | 31 kB&#xD;Progress (4): 316 kB | 118 kB | 200/263 kB | 31 kB&#xD;Progress (4): 316 kB | 118 kB | 204/263 kB | 31 kB&#xD;Progress (4): 316 kB | 118 kB | 208/263 kB | 31 kB&#xD;Progress (4): 316 kB | 118 kB | 212/263 kB | 31 kB&#xD;Progress (4): 316 kB | 118 kB | 216/263 kB | 31 kB&#xD;Progress (4): 316 kB | 118 kB | 220/263 kB | 31 kB&#xD;Progress (4): 316 kB | 118 kB | 225/263 kB | 31 kB&#xD;Progress (4): 316 kB | 118 kB | 229/263 kB | 31 kB&#xD;Progress (4): 316 kB | 118 kB | 233/263 kB | 31 kB&#xD;Progress (4): 316 kB | 118 kB | 237/263 kB | 31 kB&#xD;Progress (4): 316 kB | 118 kB | 241/263 kB | 31 kB&#xD;Progress (4): 316 kB | 118 kB | 245/263 kB | 31 kB&#xD;Progress (4): 316 kB | 118 kB | 249/263 kB | 31 kB&#xD;Progress (4): 316 kB | 118 kB | 253/263 kB | 31 kB&#xD;Progress (4): 316 kB | 118 kB | 257/263 kB | 31 kB&#xD;Progress (4): 316 kB | 118 kB | 261/263 kB | 31 kB&#xD;Progress (4): 316 kB | 118 kB | 263 kB | 31 kB    &#xD;                                              &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/surefire-api/2.12.4/surefire-api-2.12.4.jar (118 kB at 3.0 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.9/maven-reporting-api-2.0.9.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.1/commons-lang3-3.1.jar (316 kB at 7.2 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/2.0.9/maven-toolchain-2.0.9.jar&#xA;Progress (3): 263 kB | 31 kB | 4.1/232 kB&#xD;Progress (3): 263 kB | 31 kB | 7.7/232 kB&#xD;Progress (3): 263 kB | 31 kB | 12/232 kB &#xD;Progress (3): 263 kB | 31 kB | 16/232 kB&#xD;Progress (3): 263 kB | 31 kB | 20/232 kB&#xD;Progress (3): 263 kB | 31 kB | 24/232 kB&#xD;Progress (3): 263 kB | 31 kB | 28/232 kB&#xD;Progress (3): 263 kB | 31 kB | 32/232 kB&#xD;Progress (3): 263 kB | 31 kB | 36/232 kB&#xD;Progress (3): 263 kB | 31 kB | 40/232 kB&#xD;Progress (3): 263 kB | 31 kB | 45/232 kB&#xD;Progress (3): 263 kB | 31 kB | 49/232 kB&#xD;Progress (3): 263 kB | 31 kB | 53/232 kB&#xD;Progress (3): 263 kB | 31 kB | 57/232 kB&#xD;Progress (3): 263 kB | 31 kB | 61/232 kB&#xD;Progress (3): 263 kB | 31 kB | 65/232 kB&#xD;Progress (3): 263 kB | 31 kB | 69/232 kB&#xD;Progress (3): 263 kB | 31 kB | 73/232 kB&#xD;Progress (3): 263 kB | 31 kB | 77/232 kB&#xD;Progress (3): 263 kB | 31 kB | 81/232 kB&#xD;Progress (3): 263 kB | 31 kB | 86/232 kB&#xD;Progress (3): 263 kB | 31 kB | 90/232 kB&#xD;Progress (3): 263 kB | 31 kB | 94/232 kB&#xD;Progress (3): 263 kB | 31 kB | 98/232 kB&#xD;Progress (3): 263 kB | 31 kB | 102/232 kB&#xD;Progress (3): 263 kB | 31 kB | 106/232 kB&#xD;Progress (3): 263 kB | 31 kB | 110/232 kB&#xD;Progress (3): 263 kB | 31 kB | 114/232 kB&#xD;Progress (3): 263 kB | 31 kB | 118/232 kB&#xD;Progress (3): 263 kB | 31 kB | 122/232 kB&#xD;Progress (3): 263 kB | 31 kB | 126/232 kB&#xD;Progress (3): 263 kB | 31 kB | 131/232 kB&#xD;Progress (3): 263 kB | 31 kB | 135/232 kB&#xD;Progress (3): 263 kB | 31 kB | 139/232 kB&#xD;Progress (3): 263 kB | 31 kB | 143/232 kB&#xD;Progress (3): 263 kB | 31 kB | 147/232 kB&#xD;Progress (3): 263 kB | 31 kB | 151/232 kB&#xD;Progress (3): 263 kB | 31 kB | 155/232 kB&#xD;Progress (3): 263 kB | 31 kB | 159/232 kB&#xD;Progress (3): 263 kB | 31 kB | 163/232 kB&#xD;Progress (3): 263 kB | 31 kB | 167/232 kB&#xD;Progress (3): 263 kB | 31 kB | 172/232 kB&#xD;Progress (3): 263 kB | 31 kB | 176/232 kB&#xD;Progress (3): 263 kB | 31 kB | 180/232 kB&#xD;Progress (3): 263 kB | 31 kB | 184/232 kB&#xD;Progress (3): 263 kB | 31 kB | 188/232 kB&#xD;Progress (3): 263 kB | 31 kB | 192/232 kB&#xD;Progress (3): 263 kB | 31 kB | 196/232 kB&#xD;Progress (3): 263 kB | 31 kB | 200/232 kB&#xD;Progress (3): 263 kB | 31 kB | 204/232 kB&#xD;Progress (3): 263 kB | 31 kB | 208/232 kB&#xD;Progress (3): 263 kB | 31 kB | 213/232 kB&#xD;Progress (3): 263 kB | 31 kB | 217/232 kB&#xD;Progress (3): 263 kB | 31 kB | 221/232 kB&#xD;Progress (3): 263 kB | 31 kB | 225/232 kB&#xD;Progress (3): 263 kB | 31 kB | 229/232 kB&#xD;Progress (3): 263 kB | 31 kB | 232 kB    &#xD;Progress (4): 263 kB | 31 kB | 232 kB | 4.1/10 kB&#xD;Progress (4): 263 kB | 31 kB | 232 kB | 7.7/10 kB&#xD;Progress (4): 263 kB | 31 kB | 232 kB | 10 kB    &#xD;                                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/1.3/maven-common-artifact-filters-1.3.jar (31 kB at 536 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-annotations/3.1/maven-plugin-annotations-3.1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/surefire/maven-surefire-common/2.12.4/maven-surefire-common-2.12.4.jar (263 kB at 4.5 MB/s)&#xA;Progress (3): 232 kB | 10 kB | 4.1/38 kB&#xD;Progress (3): 232 kB | 10 kB | 7.7/38 kB&#xD;Progress (3): 232 kB | 10 kB | 12/38 kB &#xD;Progress (3): 232 kB | 10 kB | 16/38 kB&#xD;Progress (3): 232 kB | 10 kB | 20/38 kB&#xD;Progress (3): 232 kB | 10 kB | 24/38 kB&#xD;Progress (3): 232 kB | 10 kB | 28/38 kB&#xD;Progress (3): 232 kB | 10 kB | 32/38 kB&#xD;Progress (3): 232 kB | 10 kB | 36/38 kB&#xD;Progress (3): 232 kB | 10 kB | 38 kB   &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.0.8/plexus-utils-3.0.8.jar (232 kB at 3.6 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/reporting/maven-reporting-api/2.0.9/maven-reporting-api-2.0.9.jar (10 kB at 143 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-toolchain/2.0.9/maven-toolchain-2.0.9.jar (38 kB at 481 kB/s)&#xA;Progress (1): 4.1/14 kB&#xD;Progress (1): 7.7/14 kB&#xD;Progress (1): 12/14 kB &#xD;Progress (1): 14 kB   &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/plugin-tools/maven-plugin-annotations/3.1/maven-plugin-annotations-3.1.jar (14 kB at 135 kB/s)&#xA;[INFO] Tests are skipped.&#xA;[INFO] &#xA;[INFO] --- maven-jar-plugin:3.3.0:jar (default-jar) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/file-management/3.1.0/file-management-3.1.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/file-management/3.1.0/file-management-3.1.0.pom (4.5 kB at 93 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/36/maven-shared-components-36.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/36/maven-shared-components-36.pom (4.9 kB at 61 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/36/maven-parent-36.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 45 kB&#xD;Progress (1): 45 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/36/maven-parent-36.pom (45 kB at 798 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/26/apache-26.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 21 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/26/apache-26.pom (21 kB at 380 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.36/slf4j-api-1.7.36.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.36/slf4j-api-1.7.36.pom (2.7 kB at 53 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.7.36/slf4j-parent-1.7.36.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.7.36/slf4j-parent-1.7.36.pom (14 kB at 288 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.3.0/plexus-utils-3.3.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.3.0/plexus-utils-3.3.0.pom (5.2 kB at 89 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/5.1/plexus-5.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 23 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/5.1/plexus-5.1.pom (23 kB at 388 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.11.0/commons-io-2.11.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.11.0/commons-io-2.11.0.pom (20 kB at 318 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/52/commons-parent-52.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 45 kB&#xD;Progress (1): 49 kB&#xD;Progress (1): 53 kB&#xD;Progress (1): 57 kB&#xD;Progress (1): 61 kB&#xD;Progress (1): 66 kB&#xD;Progress (1): 70 kB&#xD;Progress (1): 74 kB&#xD;Progress (1): 78 kB&#xD;Progress (1): 79 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/52/commons-parent-52.pom (79 kB at 991 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/junit/junit-bom/5.7.2/junit-bom-5.7.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/junit/junit-bom/5.7.2/junit-bom-5.7.2.pom (5.1 kB at 71 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-archiver/3.6.0/maven-archiver-3.6.0.pom&#xA;Progress (1): 3.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-archiver/3.6.0/maven-archiver-3.6.0.pom (3.9 kB at 61 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-io/3.4.0/plexus-io-3.4.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-io/3.4.0/plexus-io-3.4.0.pom (6.0 kB at 82 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/10/plexus-10.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 25 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/10/plexus-10.pom (25 kB at 368 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/javax/inject/javax.inject/1/javax.inject-1.pom&#xA;Progress (1): 612 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/javax/inject/javax.inject/1/javax.inject-1.pom (612 B at 11 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-archiver/4.4.0/plexus-archiver-4.4.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-archiver/4.4.0/plexus-archiver-4.4.0.pom (6.3 kB at 60 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-compress/1.21/commons-compress-1.21.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-compress/1.21/commons-compress-1.21.pom (20 kB at 259 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/iq80/snappy/snappy/0.4/snappy-0.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/iq80/snappy/snappy/0.4/snappy-0.4.pom (15 kB at 246 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/tukaani/xz/1.9/xz-1.9.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/tukaani/xz/1.9/xz-1.9.pom (2.0 kB at 32 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.26/plexus-interpolation-1.26.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.26/plexus-interpolation-1.26.pom (2.7 kB at 52 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.4.2/plexus-utils-3.4.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 8.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.4.2/plexus-utils-3.4.2.pom (8.2 kB at 130 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/8/plexus-8.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 25 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/8/plexus-8.pom (25 kB at 410 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/file-management/3.1.0/file-management-3.1.0.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.36/slf4j-api-1.7.36.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.11.0/commons-io-2.11.0.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-archiver/3.6.0/maven-archiver-3.6.0.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-io/3.4.0/plexus-io-3.4.0.jar&#xA;Progress (1): 4.1/327 kB&#xD;Progress (1): 7.7/327 kB&#xD;Progress (1): 12/327 kB &#xD;Progress (1): 16/327 kB&#xD;Progress (1): 20/327 kB&#xD;Progress (1): 24/327 kB&#xD;Progress (1): 28/327 kB&#xD;Progress (1): 32/327 kB&#xD;Progress (1): 36/327 kB&#xD;Progress (1): 40/327 kB&#xD;Progress (1): 44/327 kB&#xD;Progress (1): 48/327 kB&#xD;Progress (1): 53/327 kB&#xD;Progress (1): 57/327 kB&#xD;Progress (1): 61/327 kB&#xD;Progress (1): 65/327 kB&#xD;Progress (1): 69/327 kB&#xD;Progress (1): 73/327 kB&#xD;Progress (1): 77/327 kB&#xD;Progress (1): 81/327 kB&#xD;Progress (1): 85/327 kB&#xD;Progress (1): 89/327 kB&#xD;Progress (1): 93/327 kB&#xD;Progress (1): 98/327 kB&#xD;Progress (1): 102/327 kB&#xD;Progress (1): 106/327 kB&#xD;Progress (1): 110/327 kB&#xD;Progress (1): 114/327 kB&#xD;Progress (1): 118/327 kB&#xD;Progress (1): 122/327 kB&#xD;Progress (1): 126/327 kB&#xD;Progress (2): 126/327 kB | 4.1/26 kB&#xD;Progress (2): 130/327 kB | 4.1/26 kB&#xD;Progress (2): 130/327 kB | 7.7/26 kB&#xD;Progress (2): 130/327 kB | 12/26 kB &#xD;Progress (2): 134/327 kB | 12/26 kB&#xD;Progress (2): 139/327 kB | 12/26 kB&#xD;Progress (2): 139/327 kB | 16/26 kB&#xD;Progress (2): 143/327 kB | 16/26 kB&#xD;Progress (2): 143/327 kB | 20/26 kB&#xD;Progress (2): 147/327 kB | 20/26 kB&#xD;Progress (2): 147/327 kB | 24/26 kB&#xD;Progress (2): 147/327 kB | 26 kB   &#xD;Progress (2): 151/327 kB | 26 kB&#xD;Progress (2): 155/327 kB | 26 kB&#xD;Progress (2): 159/327 kB | 26 kB&#xD;Progress (2): 163/327 kB | 26 kB&#xD;Progress (2): 167/327 kB | 26 kB&#xD;Progress (2): 171/327 kB | 26 kB&#xD;Progress (2): 175/327 kB | 26 kB&#xD;Progress (2): 179/327 kB | 26 kB&#xD;Progress (3): 179/327 kB | 26 kB | 4.1/41 kB&#xD;Progress (3): 184/327 kB | 26 kB | 4.1/41 kB&#xD;Progress (3): 188/327 kB | 26 kB | 4.1/41 kB&#xD;Progress (3): 188/327 kB | 26 kB | 7.7/41 kB&#xD;Progress (3): 192/327 kB | 26 kB | 7.7/41 kB&#xD;Progress (3): 196/327 kB | 26 kB | 7.7/41 kB&#xD;Progress (3): 196/327 kB | 26 kB | 12/41 kB &#xD;Progress (3): 196/327 kB | 26 kB | 16/41 kB&#xD;Progress (3): 200/327 kB | 26 kB | 16/41 kB&#xD;Progress (3): 204/327 kB | 26 kB | 16/41 kB&#xD;Progress (3): 208/327 kB | 26 kB | 16/41 kB&#xD;Progress (3): 212/327 kB | 26 kB | 16/41 kB&#xD;Progress (3): 212/327 kB | 26 kB | 20/41 kB&#xD;Progress (3): 212/327 kB | 26 kB | 24/41 kB&#xD;Progress (3): 216/327 kB | 26 kB | 24/41 kB&#xD;Progress (3): 216/327 kB | 26 kB | 28/41 kB&#xD;Progress (3): 220/327 kB | 26 kB | 28/41 kB&#xD;Progress (3): 220/327 kB | 26 kB | 32/41 kB&#xD;Progress (3): 225/327 kB | 26 kB | 32/41 kB&#xD;Progress (3): 229/327 kB | 26 kB | 32/41 kB&#xD;Progress (3): 229/327 kB | 26 kB | 36/41 kB&#xD;Progress (3): 229/327 kB | 26 kB | 40/41 kB&#xD;Progress (3): 233/327 kB | 26 kB | 40/41 kB&#xD;Progress (3): 233/327 kB | 26 kB | 41 kB   &#xD;Progress (3): 237/327 kB | 26 kB | 41 kB&#xD;Progress (3): 241/327 kB | 26 kB | 41 kB&#xD;Progress (3): 245/327 kB | 26 kB | 41 kB&#xD;Progress (3): 249/327 kB | 26 kB | 41 kB&#xD;Progress (3): 253/327 kB | 26 kB | 41 kB&#xD;Progress (3): 257/327 kB | 26 kB | 41 kB&#xD;Progress (3): 261/327 kB | 26 kB | 41 kB&#xD;Progress (3): 266/327 kB | 26 kB | 41 kB&#xD;Progress (3): 270/327 kB | 26 kB | 41 kB&#xD;Progress (3): 274/327 kB | 26 kB | 41 kB&#xD;Progress (3): 278/327 kB | 26 kB | 41 kB&#xD;Progress (3): 282/327 kB | 26 kB | 41 kB&#xD;Progress (3): 286/327 kB | 26 kB | 41 kB&#xD;Progress (3): 290/327 kB | 26 kB | 41 kB&#xD;Progress (3): 294/327 kB | 26 kB | 41 kB&#xD;Progress (3): 298/327 kB | 26 kB | 41 kB&#xD;Progress (3): 302/327 kB | 26 kB | 41 kB&#xD;Progress (3): 306/327 kB | 26 kB | 41 kB&#xD;Progress (3): 311/327 kB | 26 kB | 41 kB&#xD;Progress (3): 315/327 kB | 26 kB | 41 kB&#xD;Progress (3): 319/327 kB | 26 kB | 41 kB&#xD;Progress (3): 323/327 kB | 26 kB | 41 kB&#xD;Progress (3): 327/327 kB | 26 kB | 41 kB&#xD;Progress (3): 327 kB | 26 kB | 41 kB    &#xD;Progress (4): 327 kB | 26 kB | 41 kB | 4.1/36 kB&#xD;Progress (4): 327 kB | 26 kB | 41 kB | 7.7/36 kB&#xD;Progress (4): 327 kB | 26 kB | 41 kB | 12/36 kB &#xD;Progress (4): 327 kB | 26 kB | 41 kB | 16/36 kB&#xD;Progress (4): 327 kB | 26 kB | 41 kB | 20/36 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 20/36 kB | 4.1/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 24/36 kB | 4.1/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 24/36 kB | 7.7/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 28/36 kB | 7.7/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 28/36 kB | 12/79 kB &#xD;Progress (5): 327 kB | 26 kB | 41 kB | 32/36 kB | 12/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 32/36 kB | 16/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36/36 kB | 16/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36/36 kB | 20/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36 kB | 20/79 kB   &#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36 kB | 24/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36 kB | 28/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36 kB | 32/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36 kB | 36/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36 kB | 40/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36 kB | 44/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36 kB | 48/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36 kB | 53/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36 kB | 57/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36 kB | 61/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36 kB | 65/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36 kB | 69/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36 kB | 73/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36 kB | 77/79 kB&#xD;Progress (5): 327 kB | 26 kB | 41 kB | 36 kB | 79 kB   &#xD;                                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-archiver/3.6.0/maven-archiver-3.6.0.jar (26 kB at 875 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/javax/inject/javax.inject/1/javax.inject-1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.36/slf4j-api-1.7.36.jar (41 kB at 1.2 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-archiver/4.4.0/plexus-archiver-4.4.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.11.0/commons-io-2.11.0.jar (327 kB at 8.2 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-compress/1.21/commons-compress-1.21.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-io/3.4.0/plexus-io-3.4.0.jar (79 kB at 1.7 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/iq80/snappy/snappy/0.4/snappy-0.4.jar&#xA;Progress (2): 36 kB | 2.5 kB&#xD;Progress (3): 36 kB | 2.5 kB | 4.1/211 kB&#xD;Progress (3): 36 kB | 2.5 kB | 7.7/211 kB&#xD;Progress (3): 36 kB | 2.5 kB | 12/211 kB &#xD;Progress (3): 36 kB | 2.5 kB | 16/211 kB&#xD;Progress (3): 36 kB | 2.5 kB | 20/211 kB&#xD;Progress (3): 36 kB | 2.5 kB | 24/211 kB&#xD;Progress (3): 36 kB | 2.5 kB | 28/211 kB&#xD;Progress (3): 36 kB | 2.5 kB | 32/211 kB&#xD;Progress (3): 36 kB | 2.5 kB | 36/211 kB&#xD;Progress (3): 36 kB | 2.5 kB | 40/211 kB&#xD;Progress (4): 36 kB | 2.5 kB | 40/211 kB | 0/1.0 MB&#xD;Progress (4): 36 kB | 2.5 kB | 45/211 kB | 0/1.0 MB&#xD;Progress (4): 36 kB | 2.5 kB | 49/211 kB | 0/1.0 MB&#xD;Progress (4): 36 kB | 2.5 kB | 53/211 kB | 0/1.0 MB&#xD;Progress (4): 36 kB | 2.5 kB | 53/211 kB | 0/1.0 MB&#xD;Progress (4): 36 kB | 2.5 kB | 57/211 kB | 0/1.0 MB&#xD;Progress (4): 36 kB | 2.5 kB | 61/211 kB | 0/1.0 MB&#xD;Progress (4): 36 kB | 2.5 kB | 61/211 kB | 0/1.0 MB&#xD;Progress (4): 36 kB | 2.5 kB | 65/211 kB | 0/1.0 MB&#xD;Progress (4): 36 kB | 2.5 kB | 69/211 kB | 0/1.0 MB&#xD;Progress (4): 36 kB | 2.5 kB | 69/211 kB | 0/1.0 MB&#xD;Progress (4): 36 kB | 2.5 kB | 73/211 kB | 0/1.0 MB&#xD;Progress (4): 36 kB | 2.5 kB | 77/211 kB | 0/1.0 MB&#xD;Progress (4): 36 kB | 2.5 kB | 81/211 kB | 0/1.0 MB&#xD;Progress (4): 36 kB | 2.5 kB | 86/211 kB | 0/1.0 MB&#xD;Progress (4): 36 kB | 2.5 kB | 86/211 kB | 0/1.0 MB&#xD;                                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/file-management/3.1.0/file-management-3.1.0.jar (36 kB at 661 kB/s)&#xA;Progress (3): 2.5 kB | 90/211 kB | 0/1.0 MB&#xD;Progress (3): 2.5 kB | 90/211 kB | 0/1.0 MB&#xD;                                           &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/tukaani/xz/1.9/xz-1.9.jar&#xA;Progress (3): 2.5 kB | 94/211 kB | 0/1.0 MB&#xD;Progress (3): 2.5 kB | 98/211 kB | 0/1.0 MB&#xD;Progress (3): 2.5 kB | 98/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 102/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 102/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 106/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 106/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 110/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 110/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 114/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 118/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 122/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 122/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 126/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 126/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 131/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 135/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 139/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 139/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 139/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 143/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 143/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 147/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 151/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 155/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 155/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 155/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 159/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 163/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 167/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 167/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 172/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 172/211 kB | 0.1/1.0 MB&#xD;Progress (3): 2.5 kB | 172/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 172/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 172/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 176/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 176/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 180/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 184/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 184/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 188/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 188/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 192/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 192/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 196/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 196/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 200/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 204/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 204/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 208/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 208/211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.2/1.0 MB    &#xD;Progress (3): 2.5 kB | 211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.2/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.3/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.4/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.4/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.4/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.4/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.4/1.0 MB&#xD;Progress (3): 2.5 kB | 211 kB | 0.4/1.0 MB&#xD;                                          &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/javax/inject/javax.inject/1/javax.inject-1.jar (2.5 kB at 42 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.26/plexus-interpolation-1.26.jar&#xA;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.4/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.5/1.0 MB&#xD;Progress (2): 211 kB | 0.6/1.0 MB&#xD;Progress (2): 211 kB | 0.6/1.0 MB&#xD;Progress (2): 211 kB | 0.6/1.0 MB&#xD;Progress (2): 211 kB | 0.6/1.0 MB&#xD;Progress (2): 211 kB | 0.6/1.0 MB&#xD;Progress (2): 211 kB | 0.6/1.0 MB&#xD;Progress (2): 211 kB | 0.6/1.0 MB&#xD;Progress (2): 211 kB | 0.6/1.0 MB&#xD;Progress (2): 211 kB | 0.6/1.0 MB&#xD;Progress (2): 211 kB | 0.6/1.0 MB&#xD;Progress (2): 211 kB | 0.6/1.0 MB&#xD;Progress (2): 211 kB | 0.6/1.0 MB&#xD;Progress (2): 211 kB | 0.7/1.0 MB&#xD;Progress (2): 211 kB | 0.7/1.0 MB&#xD;Progress (2): 211 kB | 0.7/1.0 MB&#xD;Progress (2): 211 kB | 0.7/1.0 MB&#xD;Progress (2): 211 kB | 0.7/1.0 MB&#xD;Progress (2): 211 kB | 0.7/1.0 MB&#xD;Progress (2): 211 kB | 0.7/1.0 MB&#xD;Progress (2): 211 kB | 0.7/1.0 MB&#xD;Progress (2): 211 kB | 0.7/1.0 MB&#xD;Progress (2): 211 kB | 0.7/1.0 MB&#xD;Progress (2): 211 kB | 0.7/1.0 MB&#xD;Progress (2): 211 kB | 0.7/1.0 MB&#xD;Progress (2): 211 kB | 0.8/1.0 MB&#xD;Progress (2): 211 kB | 0.8/1.0 MB&#xD;Progress (2): 211 kB | 0.8/1.0 MB&#xD;Progress (2): 211 kB | 0.8/1.0 MB&#xD;Progress (2): 211 kB | 0.8/1.0 MB&#xD;Progress (2): 211 kB | 0.8/1.0 MB&#xD;Progress (2): 211 kB | 0.8/1.0 MB&#xD;Progress (2): 211 kB | 0.8/1.0 MB&#xD;Progress (2): 211 kB | 0.8/1.0 MB&#xD;Progress (2): 211 kB | 0.8/1.0 MB&#xD;Progress (2): 211 kB | 0.8/1.0 MB&#xD;Progress (2): 211 kB | 0.8/1.0 MB&#xD;Progress (2): 211 kB | 0.9/1.0 MB&#xD;Progress (2): 211 kB | 0.9/1.0 MB&#xD;Progress (2): 211 kB | 0.9/1.0 MB&#xD;Progress (2): 211 kB | 0.9/1.0 MB&#xD;Progress (2): 211 kB | 0.9/1.0 MB&#xD;Progress (2): 211 kB | 0.9/1.0 MB&#xD;Progress (2): 211 kB | 0.9/1.0 MB&#xD;Progress (2): 211 kB | 0.9/1.0 MB&#xD;Progress (2): 211 kB | 0.9/1.0 MB&#xD;Progress (2): 211 kB | 0.9/1.0 MB&#xD;Progress (2): 211 kB | 0.9/1.0 MB&#xD;Progress (2): 211 kB | 0.9/1.0 MB&#xD;Progress (2): 211 kB | 1.0/1.0 MB&#xD;Progress (2): 211 kB | 1.0/1.0 MB&#xD;Progress (2): 211 kB | 1.0/1.0 MB&#xD;Progress (2): 211 kB | 1.0/1.0 MB&#xD;Progress (2): 211 kB | 1.0/1.0 MB&#xD;Progress (2): 211 kB | 1.0/1.0 MB&#xD;Progress (2): 211 kB | 1.0/1.0 MB&#xD;Progress (2): 211 kB | 1.0/1.0 MB&#xD;Progress (2): 211 kB | 1.0/1.0 MB&#xD;Progress (2): 211 kB | 1.0 MB    &#xD;Progress (3): 211 kB | 1.0 MB | 4.1/58 kB&#xD;Progress (3): 211 kB | 1.0 MB | 7.7/58 kB&#xD;Progress (3): 211 kB | 1.0 MB | 12/58 kB &#xD;Progress (3): 211 kB | 1.0 MB | 16/58 kB&#xD;Progress (3): 211 kB | 1.0 MB | 20/58 kB&#xD;Progress (3): 211 kB | 1.0 MB | 24/58 kB&#xD;Progress (3): 211 kB | 1.0 MB | 28/58 kB&#xD;Progress (3): 211 kB | 1.0 MB | 32/58 kB&#xD;Progress (3): 211 kB | 1.0 MB | 36/58 kB&#xD;Progress (3): 211 kB | 1.0 MB | 40/58 kB&#xD;Progress (3): 211 kB | 1.0 MB | 44/58 kB&#xD;Progress (3): 211 kB | 1.0 MB | 48/58 kB&#xD;Progress (3): 211 kB | 1.0 MB | 52/58 kB&#xD;Progress (3): 211 kB | 1.0 MB | 57/58 kB&#xD;Progress (3): 211 kB | 1.0 MB | 58 kB   &#xD;                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-archiver/4.4.0/plexus-archiver-4.4.0.jar (211 kB at 2.9 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.4.2/plexus-utils-3.4.2.jar&#xA;Progress (3): 1.0 MB | 58 kB | 4.1/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 7.7/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 12/85 kB &#xD;Progress (3): 1.0 MB | 58 kB | 16/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 20/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 24/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 28/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 32/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 36/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 40/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 44/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 48/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 53/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 57/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 61/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 65/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 69/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 73/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 77/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 81/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 85/85 kB&#xD;Progress (3): 1.0 MB | 58 kB | 85 kB   &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-compress/1.21/commons-compress-1.21.jar (1.0 MB at 13 MB/s)&#xA;Progress (3): 58 kB | 85 kB | 4.1/116 kB&#xD;Progress (3): 58 kB | 85 kB | 7.7/116 kB&#xD;Progress (3): 58 kB | 85 kB | 12/116 kB &#xD;Progress (3): 58 kB | 85 kB | 16/116 kB&#xD;Progress (3): 58 kB | 85 kB | 20/116 kB&#xD;Progress (3): 58 kB | 85 kB | 24/116 kB&#xD;Progress (3): 58 kB | 85 kB | 28/116 kB&#xD;Progress (3): 58 kB | 85 kB | 32/116 kB&#xD;Progress (3): 58 kB | 85 kB | 36/116 kB&#xD;Progress (3): 58 kB | 85 kB | 40/116 kB&#xD;Progress (3): 58 kB | 85 kB | 45/116 kB&#xD;Progress (3): 58 kB | 85 kB | 49/116 kB&#xD;Progress (3): 58 kB | 85 kB | 53/116 kB&#xD;Progress (3): 58 kB | 85 kB | 57/116 kB&#xD;Progress (3): 58 kB | 85 kB | 61/116 kB&#xD;Progress (3): 58 kB | 85 kB | 65/116 kB&#xD;Progress (3): 58 kB | 85 kB | 69/116 kB&#xD;Progress (3): 58 kB | 85 kB | 73/116 kB&#xD;Progress (3): 58 kB | 85 kB | 77/116 kB&#xD;Progress (3): 58 kB | 85 kB | 81/116 kB&#xD;Progress (3): 58 kB | 85 kB | 86/116 kB&#xD;Progress (3): 58 kB | 85 kB | 90/116 kB&#xD;Progress (3): 58 kB | 85 kB | 94/116 kB&#xD;Progress (3): 58 kB | 85 kB | 98/116 kB&#xD;Progress (3): 58 kB | 85 kB | 102/116 kB&#xD;Progress (3): 58 kB | 85 kB | 106/116 kB&#xD;Progress (3): 58 kB | 85 kB | 110/116 kB&#xD;Progress (3): 58 kB | 85 kB | 114/116 kB&#xD;Progress (3): 58 kB | 85 kB | 116 kB    &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.26/plexus-interpolation-1.26.jar (85 kB at 959 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/iq80/snappy/snappy/0.4/snappy-0.4.jar (58 kB at 623 kB/s)&#xA;Progress (2): 116 kB | 4.1/267 kB&#xD;Progress (2): 116 kB | 7.7/267 kB&#xD;Progress (2): 116 kB | 12/267 kB &#xD;Progress (2): 116 kB | 16/267 kB&#xD;Progress (2): 116 kB | 20/267 kB&#xD;Progress (2): 116 kB | 24/267 kB&#xD;Progress (2): 116 kB | 28/267 kB&#xD;Progress (2): 116 kB | 32/267 kB&#xD;Progress (2): 116 kB | 36/267 kB&#xD;Progress (2): 116 kB | 40/267 kB&#xD;Progress (2): 116 kB | 45/267 kB&#xD;Progress (2): 116 kB | 49/267 kB&#xD;Progress (2): 116 kB | 53/267 kB&#xD;Progress (2): 116 kB | 57/267 kB&#xD;Progress (2): 116 kB | 61/267 kB&#xD;Progress (2): 116 kB | 65/267 kB&#xD;Progress (2): 116 kB | 69/267 kB&#xD;Progress (2): 116 kB | 73/267 kB&#xD;Progress (2): 116 kB | 77/267 kB&#xD;Progress (2): 116 kB | 81/267 kB&#xD;Progress (2): 116 kB | 86/267 kB&#xD;Progress (2): 116 kB | 90/267 kB&#xD;Progress (2): 116 kB | 94/267 kB&#xD;Progress (2): 116 kB | 98/267 kB&#xD;Progress (2): 116 kB | 102/267 kB&#xD;Progress (2): 116 kB | 106/267 kB&#xD;Progress (2): 116 kB | 110/267 kB&#xD;Progress (2): 116 kB | 114/267 kB&#xD;Progress (2): 116 kB | 118/267 kB&#xD;Progress (2): 116 kB | 122/267 kB&#xD;Progress (2): 116 kB | 126/267 kB&#xD;Progress (2): 116 kB | 131/267 kB&#xD;Progress (2): 116 kB | 135/267 kB&#xD;Progress (2): 116 kB | 139/267 kB&#xD;Progress (2): 116 kB | 143/267 kB&#xD;Progress (2): 116 kB | 147/267 kB&#xD;Progress (2): 116 kB | 151/267 kB&#xD;Progress (2): 116 kB | 155/267 kB&#xD;Progress (2): 116 kB | 159/267 kB&#xD;Progress (2): 116 kB | 163/267 kB&#xD;Progress (2): 116 kB | 167/267 kB&#xD;Progress (2): 116 kB | 172/267 kB&#xD;Progress (2): 116 kB | 176/267 kB&#xD;Progress (2): 116 kB | 180/267 kB&#xD;Progress (2): 116 kB | 184/267 kB&#xD;Progress (2): 116 kB | 188/267 kB&#xD;Progress (2): 116 kB | 192/267 kB&#xD;Progress (2): 116 kB | 196/267 kB&#xD;Progress (2): 116 kB | 200/267 kB&#xD;Progress (2): 116 kB | 204/267 kB&#xD;Progress (2): 116 kB | 208/267 kB&#xD;Progress (2): 116 kB | 213/267 kB&#xD;Progress (2): 116 kB | 217/267 kB&#xD;Progress (2): 116 kB | 221/267 kB&#xD;Progress (2): 116 kB | 225/267 kB&#xD;Progress (2): 116 kB | 229/267 kB&#xD;Progress (2): 116 kB | 233/267 kB&#xD;Progress (2): 116 kB | 237/267 kB&#xD;Progress (2): 116 kB | 241/267 kB&#xD;Progress (2): 116 kB | 245/267 kB&#xD;Progress (2): 116 kB | 249/267 kB&#xD;Progress (2): 116 kB | 253/267 kB&#xD;Progress (2): 116 kB | 257/267 kB&#xD;Progress (2): 116 kB | 261/267 kB&#xD;Progress (2): 116 kB | 265/267 kB&#xD;Progress (2): 116 kB | 267 kB    &#xD;                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/tukaani/xz/1.9/xz-1.9.jar (116 kB at 1.1 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.4.2/plexus-utils-3.4.2.jar (267 kB at 2.3 MB/s)&#xA;[INFO] Building jar: /work/target/hacbs-test.jar&#xA;[INFO] &#xA;[INFO] --- maven-shade-plugin:3.2.4:shade (default) @ simple-java-project ---&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/3.0/maven-plugin-api-3.0.pom&#xA;Progress (1): 2.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/3.0/maven-plugin-api-3.0.pom (2.3 kB at 48 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/3.0/maven-3.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 22 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven/3.0/maven-3.0.pom (22 kB at 576 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/15/maven-parent-15.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 24 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/15/maven-parent-15.pom (24 kB at 533 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/3.0/maven-model-3.0.pom&#xA;Progress (1): 3.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/3.0/maven-model-3.0.pom (3.9 kB at 70 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.4/plexus-utils-2.0.4.pom&#xA;Progress (1): 3.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/2.0.4/plexus-utils-2.0.4.pom (3.3 kB at 74 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/3.0/maven-artifact-3.0.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/3.0/maven-artifact-3.0.pom (1.9 kB at 36 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-plexus/1.4.2/sisu-inject-plexus-1.4.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-plexus/1.4.2/sisu-inject-plexus-1.4.2.pom (5.4 kB at 114 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/inject/guice-plexus/1.4.2/guice-plexus-1.4.2.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/inject/guice-plexus/1.4.2/guice-plexus-1.4.2.pom (3.1 kB at 64 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/inject/guice-bean/1.4.2/guice-bean-1.4.2.pom&#xA;Progress (1): 2.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/inject/guice-bean/1.4.2/guice-bean-1.4.2.pom (2.6 kB at 55 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject/1.4.2/sisu-inject-1.4.2.pom&#xA;Progress (1): 1.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject/1.4.2/sisu-inject-1.4.2.pom (1.2 kB at 22 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-parent/1.4.2/sisu-parent-1.4.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-parent/1.4.2/sisu-parent-1.4.2.pom (7.8 kB at 165 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/6/forge-parent-6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/forge/forge-parent/6/forge-parent-6.pom (11 kB at 199 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/2.0.0/plexus-component-annotations-2.0.0.pom&#xA;Progress (1): 750 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/2.0.0/plexus-component-annotations-2.0.0.pom (750 B at 18 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/2.0.0/plexus-containers-2.0.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-containers/2.0.0/plexus-containers-2.0.0.pom (4.8 kB at 100 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.3/plexus-classworlds-2.2.3.pom&#xA;Progress (1): 4.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.3/plexus-classworlds-2.2.3.pom (4.0 kB at 93 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-bean/1.4.2/sisu-inject-bean-1.4.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-bean/1.4.2/sisu-inject-bean-1.4.2.pom (5.5 kB at 99 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-guice/2.1.7/sisu-guice-2.1.7.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-guice/2.1.7/sisu-guice-2.1.7.pom (11 kB at 221 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/3.0/maven-core-3.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/3.0/maven-core-3.0.pom (6.6 kB at 147 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/3.0/maven-settings-3.0.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/3.0/maven-settings-3.0.pom (1.9 kB at 38 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings-builder/3.0/maven-settings-builder-3.0.pom&#xA;Progress (1): 2.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings-builder/3.0/maven-settings-builder-3.0.pom (2.2 kB at 46 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.14/plexus-interpolation-1.14.pom&#xA;Progress (1): 910 B&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.14/plexus-interpolation-1.14.pom (910 B at 19 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.18/plexus-components-1.1.18.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-components/1.1.18/plexus-components-1.1.18.pom (5.4 kB at 107 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/3.0/maven-repository-metadata-3.0.pom&#xA;Progress (1): 1.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/3.0/maven-repository-metadata-3.0.pom (1.9 kB at 39 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model-builder/3.0/maven-model-builder-3.0.pom&#xA;Progress (1): 2.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model-builder/3.0/maven-model-builder-3.0.pom (2.2 kB at 44 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-aether-provider/3.0/maven-aether-provider-3.0.pom&#xA;Progress (1): 2.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-aether-provider/3.0/maven-aether-provider-3.0.pom (2.5 kB at 43 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-api/1.7/aether-api-1.7.pom&#xA;Progress (1): 1.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-api/1.7/aether-api-1.7.pom (1.7 kB at 38 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-parent/1.7/aether-parent-1.7.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-parent/1.7/aether-parent-1.7.pom (7.7 kB at 172 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-util/1.7/aether-util-1.7.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-util/1.7/aether-util-1.7.pom (2.1 kB at 38 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-impl/1.7/aether-impl-1.7.pom&#xA;Progress (1): 3.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-impl/1.7/aether-impl-1.7.pom (3.7 kB at 72 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-spi/1.7/aether-spi-1.7.pom&#xA;Progress (1): 1.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-spi/1.7/aether-spi-1.7.pom (1.7 kB at 39 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-artifact-transfer/0.12.0/maven-artifact-transfer-0.12.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-artifact-transfer/0.12.0/maven-artifact-transfer-0.12.0.pom (11 kB at 274 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/33/maven-shared-components-33.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/33/maven-shared-components-33.pom (5.1 kB at 127 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/33/maven-parent-33.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 44 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/33/maven-parent-33.pom (44 kB at 1.1 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/21/apache-21.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 17 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/21/apache-21.pom (17 kB at 364 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/3.0.1/maven-common-artifact-filters-3.0.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/3.0.1/maven-common-artifact-filters-3.0.1.pom (4.8 kB at 99 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/30/maven-shared-components-30.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-components/30/maven-shared-components-30.pom (4.6 kB at 92 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/30/maven-parent-30.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 41 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-parent/30/maven-parent-30.pom (41 kB at 918 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/18/apache-18.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/18/apache-18.pom (16 kB at 341 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/3.1.0/maven-shared-utils-3.1.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/3.1.0/maven-shared-utils-3.1.0.pom (5.0 kB at 119 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.5/commons-io-2.5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 13 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.5/commons-io-2.5.pom (13 kB at 316 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/39/commons-parent-39.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 45 kB&#xD;Progress (1): 49 kB&#xD;Progress (1): 53 kB&#xD;Progress (1): 57 kB&#xD;Progress (1): 61 kB&#xD;Progress (1): 62 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/39/commons-parent-39.pom (62 kB at 1.4 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/apache/16/apache-16.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/apache/16/apache-16.pom (15 kB at 321 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.1.1/plexus-utils-3.1.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.1.1/plexus-utils-3.1.1.pom (5.1 kB at 101 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/4.0/plexus-4.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 22 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus/4.0/plexus-4.0.pom (22 kB at 478 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-codec/commons-codec/1.11/commons-codec-1.11.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-codec/commons-codec/1.11/commons-codec-1.11.pom (14 kB at 285 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/42/commons-parent-42.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 29 kB&#xD;Progress (1): 33 kB&#xD;Progress (1): 37 kB&#xD;Progress (1): 41 kB&#xD;Progress (1): 45 kB&#xD;Progress (1): 49 kB&#xD;Progress (1): 53 kB&#xD;Progress (1): 57 kB&#xD;Progress (1): 61 kB&#xD;Progress (1): 66 kB&#xD;Progress (1): 68 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-parent/42/commons-parent-42.pom (68 kB at 1.4 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.5/slf4j-api-1.7.5.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.5/slf4j-api-1.7.5.pom (2.7 kB at 58 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.7.5/slf4j-parent-1.7.5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-parent/1.7.5/slf4j-parent-1.7.5.pom (12 kB at 268 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm/8.0/asm-8.0.pom&#xA;Progress (1): 2.9 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm/8.0/asm-8.0.pom (2.9 kB at 67 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/ow2/1.5/ow2-1.5.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/ow2/1.5/ow2-1.5.pom (11 kB at 288 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-commons/8.0/asm-commons-8.0.pom&#xA;Progress (1): 3.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-commons/8.0/asm-commons-8.0.pom (3.7 kB at 89 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-tree/8.0/asm-tree-8.0.pom&#xA;Progress (1): 3.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-tree/8.0/asm-tree-8.0.pom (3.1 kB at 58 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-analysis/8.0/asm-analysis-8.0.pom&#xA;Progress (1): 3.2 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-analysis/8.0/asm-analysis-8.0.pom (3.2 kB at 75 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/jdom/jdom2/2.0.6/jdom2-2.0.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/jdom/jdom2/2.0.6/jdom2-2.0.6.pom (4.6 kB at 128 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-dependency-tree/3.0.1/maven-dependency-tree-3.0.1.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 7.5 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-dependency-tree/3.0.1/maven-dependency-tree-3.0.1.pom (7.5 kB at 183 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether-util/0.9.0.M2/aether-util-0.9.0.M2.pom&#xA;Progress (1): 2.0 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether-util/0.9.0.M2/aether-util-0.9.0.M2.pom (2.0 kB at 42 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether/0.9.0.M2/aether-0.9.0.M2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 28 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether/0.9.0.M2/aether-0.9.0.M2.pom (28 kB at 619 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.6/commons-io-2.6.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 14 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.6/commons-io-2.6.pom (14 kB at 356 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/vafer/jdependency/2.4.0/jdependency-2.4.0.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 15 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/vafer/jdependency/2.4.0/jdependency-2.4.0.pom (15 kB at 321 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-util/8.0/asm-util-8.0.pom&#xA;Progress (1): 3.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-util/8.0/asm-util-8.0.pom (3.7 kB at 89 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/guava/28.2-android/guava-28.2-android.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 11 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/guava/28.2-android/guava-28.2-android.pom (11 kB at 273 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/guava-parent/28.2-android/guava-parent-28.2-android.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 13 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/guava-parent/28.2-android/guava-parent-28.2-android.pom (13 kB at 287 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/failureaccess/1.0.1/failureaccess-1.0.1.pom&#xA;Progress (1): 2.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/failureaccess/1.0.1/failureaccess-1.0.1.pom (2.4 kB at 60 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/guava-parent/26.0-android/guava-parent-26.0-android.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 10 kB &#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/guava-parent/26.0-android/guava-parent-26.0-android.pom (10 kB at 268 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/oss/oss-parent/9/oss-parent-9.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 6.6 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/oss/oss-parent/9/oss-parent-9.pom (6.6 kB at 173 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/listenablefuture/9999.0-empty-to-avoid-conflict-with-guava/listenablefuture-9999.0-empty-to-avoid-conflict-with-guava.pom&#xA;Progress (1): 2.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/listenablefuture/9999.0-empty-to-avoid-conflict-with-guava/listenablefuture-9999.0-empty-to-avoid-conflict-with-guava.pom (2.3 kB at 54 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/3.0.2/jsr305-3.0.2.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.3 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/3.0.2/jsr305-3.0.2.pom (4.3 kB at 97 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/oss/oss-parent/7/oss-parent-7.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 4.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/oss/oss-parent/7/oss-parent-7.pom (4.8 kB at 124 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/checkerframework/checker-compat-qual/2.5.5/checker-compat-qual-2.5.5.pom&#xA;Progress (1): 2.7 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/checkerframework/checker-compat-qual/2.5.5/checker-compat-qual-2.5.5.pom (2.7 kB at 65 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_annotations/2.3.4/error_prone_annotations-2.3.4.pom&#xA;Progress (1): 2.1 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_annotations/2.3.4/error_prone_annotations-2.3.4.pom (2.1 kB at 50 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_parent/2.3.4/error_prone_parent-2.3.4.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 5.4 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_parent/2.3.4/error_prone_parent-2.3.4.pom (5.4 kB at 132 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/j2objc/j2objc-annotations/1.3/j2objc-annotations-1.3.pom&#xA;Progress (1): 2.8 kB&#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/j2objc/j2objc-annotations/1.3/j2objc-annotations-1.3.pom (2.8 kB at 69 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.7/commons-lang3-3.7.pom&#xA;Progress (1): 4.1 kB&#xD;Progress (1): 8.2 kB&#xD;Progress (1): 12 kB &#xD;Progress (1): 16 kB&#xD;Progress (1): 20 kB&#xD;Progress (1): 25 kB&#xD;Progress (1): 28 kB&#xD;                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.7/commons-lang3-3.7.pom (28 kB at 626 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/3.0/maven-plugin-api-3.0.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-bean/1.4.2/sisu-inject-bean-1.4.2.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/3.0/maven-model-3.0.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-plexus/1.4.2/sisu-inject-plexus-1.4.2.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-guice/2.1.7/sisu-guice-2.1.7-noaop.jar&#xA;Progress (1): 4.1/49 kB&#xD;Progress (1): 7.7/49 kB&#xD;Progress (1): 12/49 kB &#xD;Progress (1): 16/49 kB&#xD;Progress (1): 20/49 kB&#xD;Progress (1): 24/49 kB&#xD;Progress (1): 28/49 kB&#xD;Progress (1): 32/49 kB&#xD;Progress (1): 36/49 kB&#xD;Progress (1): 40/49 kB&#xD;Progress (1): 45/49 kB&#xD;Progress (1): 49/49 kB&#xD;Progress (1): 49 kB   &#xD;Progress (2): 49 kB | 4.1/202 kB&#xD;Progress (2): 49 kB | 7.7/202 kB&#xD;Progress (2): 49 kB | 12/202 kB &#xD;Progress (2): 49 kB | 16/202 kB&#xD;Progress (2): 49 kB | 20/202 kB&#xD;Progress (2): 49 kB | 24/202 kB&#xD;Progress (2): 49 kB | 28/202 kB&#xD;Progress (2): 49 kB | 32/202 kB&#xD;Progress (2): 49 kB | 36/202 kB&#xD;Progress (2): 49 kB | 40/202 kB&#xD;Progress (2): 49 kB | 45/202 kB&#xD;Progress (2): 49 kB | 49/202 kB&#xD;Progress (2): 49 kB | 53/202 kB&#xD;Progress (2): 49 kB | 57/202 kB&#xD;Progress (2): 49 kB | 61/202 kB&#xD;Progress (2): 49 kB | 65/202 kB&#xD;Progress (2): 49 kB | 69/202 kB&#xD;Progress (2): 49 kB | 73/202 kB&#xD;Progress (2): 49 kB | 77/202 kB&#xD;Progress (2): 49 kB | 81/202 kB&#xD;Progress (2): 49 kB | 86/202 kB&#xD;Progress (2): 49 kB | 90/202 kB&#xD;Progress (2): 49 kB | 94/202 kB&#xD;Progress (2): 49 kB | 98/202 kB&#xD;Progress (2): 49 kB | 102/202 kB&#xD;Progress (2): 49 kB | 106/202 kB&#xD;Progress (2): 49 kB | 110/202 kB&#xD;Progress (2): 49 kB | 114/202 kB&#xD;Progress (2): 49 kB | 118/202 kB&#xD;Progress (2): 49 kB | 122/202 kB&#xD;Progress (3): 49 kB | 122/202 kB | 4.1/153 kB&#xD;Progress (3): 49 kB | 122/202 kB | 7.7/153 kB&#xD;Progress (3): 49 kB | 122/202 kB | 12/153 kB &#xD;Progress (3): 49 kB | 122/202 kB | 16/153 kB&#xD;Progress (3): 49 kB | 122/202 kB | 20/153 kB&#xD;Progress (3): 49 kB | 122/202 kB | 24/153 kB&#xD;Progress (3): 49 kB | 122/202 kB | 28/153 kB&#xD;Progress (3): 49 kB | 122/202 kB | 32/153 kB&#xD;Progress (3): 49 kB | 122/202 kB | 36/153 kB&#xD;Progress (3): 49 kB | 122/202 kB | 40/153 kB&#xD;Progress (3): 49 kB | 126/202 kB | 40/153 kB&#xD;Progress (3): 49 kB | 126/202 kB | 45/153 kB&#xD;Progress (3): 49 kB | 131/202 kB | 45/153 kB&#xD;Progress (3): 49 kB | 135/202 kB | 45/153 kB&#xD;Progress (3): 49 kB | 135/202 kB | 49/153 kB&#xD;Progress (3): 49 kB | 139/202 kB | 49/153 kB&#xD;Progress (3): 49 kB | 139/202 kB | 53/153 kB&#xD;Progress (3): 49 kB | 139/202 kB | 57/153 kB&#xD;Progress (3): 49 kB | 143/202 kB | 57/153 kB&#xD;Progress (3): 49 kB | 143/202 kB | 61/153 kB&#xD;Progress (3): 49 kB | 147/202 kB | 61/153 kB&#xD;Progress (3): 49 kB | 147/202 kB | 65/153 kB&#xD;Progress (3): 49 kB | 151/202 kB | 65/153 kB&#xD;Progress (3): 49 kB | 151/202 kB | 69/153 kB&#xD;Progress (3): 49 kB | 155/202 kB | 69/153 kB&#xD;Progress (3): 49 kB | 155/202 kB | 73/153 kB&#xD;Progress (3): 49 kB | 155/202 kB | 77/153 kB&#xD;Progress (3): 49 kB | 155/202 kB | 81/153 kB&#xD;Progress (3): 49 kB | 155/202 kB | 86/153 kB&#xD;Progress (3): 49 kB | 155/202 kB | 90/153 kB&#xD;Progress (3): 49 kB | 155/202 kB | 94/153 kB&#xD;Progress (3): 49 kB | 155/202 kB | 98/153 kB&#xD;Progress (3): 49 kB | 155/202 kB | 102/153 kB&#xD;Progress (3): 49 kB | 155/202 kB | 106/153 kB&#xD;Progress (3): 49 kB | 155/202 kB | 110/153 kB&#xD;Progress (3): 49 kB | 155/202 kB | 114/153 kB&#xD;Progress (3): 49 kB | 155/202 kB | 118/153 kB&#xD;Progress (4): 49 kB | 155/202 kB | 118/153 kB | 4.1/472 kB&#xD;Progress (4): 49 kB | 159/202 kB | 118/153 kB | 4.1/472 kB&#xD;Progress (4): 49 kB | 159/202 kB | 118/153 kB | 7.7/472 kB&#xD;Progress (4): 49 kB | 159/202 kB | 122/153 kB | 7.7/472 kB&#xD;Progress (4): 49 kB | 159/202 kB | 122/153 kB | 12/472 kB &#xD;Progress (4): 49 kB | 163/202 kB | 122/153 kB | 12/472 kB&#xD;Progress (4): 49 kB | 163/202 kB | 122/153 kB | 16/472 kB&#xD;Progress (4): 49 kB | 163/202 kB | 126/153 kB | 16/472 kB&#xD;Progress (4): 49 kB | 167/202 kB | 126/153 kB | 16/472 kB&#xD;Progress (4): 49 kB | 167/202 kB | 126/153 kB | 20/472 kB&#xD;Progress (4): 49 kB | 172/202 kB | 126/153 kB | 20/472 kB&#xD;Progress (4): 49 kB | 172/202 kB | 131/153 kB | 20/472 kB&#xD;Progress (4): 49 kB | 172/202 kB | 131/153 kB | 24/472 kB&#xD;Progress (4): 49 kB | 176/202 kB | 131/153 kB | 24/472 kB&#xD;Progress (4): 49 kB | 176/202 kB | 131/153 kB | 28/472 kB&#xD;Progress (4): 49 kB | 176/202 kB | 135/153 kB | 28/472 kB&#xD;Progress (4): 49 kB | 176/202 kB | 135/153 kB | 32/472 kB&#xD;Progress (4): 49 kB | 180/202 kB | 135/153 kB | 32/472 kB&#xD;Progress (4): 49 kB | 180/202 kB | 139/153 kB | 32/472 kB&#xD;Progress (4): 49 kB | 184/202 kB | 139/153 kB | 32/472 kB&#xD;Progress (4): 49 kB | 184/202 kB | 143/153 kB | 32/472 kB&#xD;Progress (4): 49 kB | 184/202 kB | 143/153 kB | 36/472 kB&#xD;Progress (4): 49 kB | 188/202 kB | 143/153 kB | 36/472 kB&#xD;Progress (4): 49 kB | 188/202 kB | 143/153 kB | 40/472 kB&#xD;Progress (4): 49 kB | 188/202 kB | 147/153 kB | 40/472 kB&#xD;Progress (4): 49 kB | 192/202 kB | 147/153 kB | 40/472 kB&#xD;Progress (4): 49 kB | 192/202 kB | 151/153 kB | 40/472 kB&#xD;Progress (4): 49 kB | 192/202 kB | 151/153 kB | 45/472 kB&#xD;Progress (4): 49 kB | 192/202 kB | 153 kB | 45/472 kB    &#xD;Progress (4): 49 kB | 196/202 kB | 153 kB | 45/472 kB&#xD;Progress (4): 49 kB | 196/202 kB | 153 kB | 49/472 kB&#xD;Progress (4): 49 kB | 200/202 kB | 153 kB | 49/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 49/472 kB    &#xD;Progress (4): 49 kB | 202 kB | 153 kB | 53/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 57/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 61/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 65/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 69/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 73/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 77/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 81/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 86/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 90/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 94/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 98/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 102/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 106/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 110/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 114/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 118/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 122/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 126/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 131/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 135/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 139/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 143/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 147/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 151/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 155/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 159/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 163/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 167/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 172/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 176/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 180/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 184/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 188/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 192/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 196/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 200/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 204/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 208/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 212/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 217/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 221/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 225/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 229/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 233/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 237/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 240/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 244/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 248/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 252/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 256/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 260/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 265/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 269/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 273/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 277/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 281/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 285/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 289/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 293/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 297/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 301/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 306/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 310/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 314/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 318/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 322/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 326/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 330/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 334/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 338/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 342/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 346/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 351/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 355/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 359/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 363/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 367/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 371/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 375/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 379/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 383/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 387/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 392/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 396/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 400/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 404/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 408/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 412/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 416/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 420/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 424/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 428/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 432/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 437/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 441/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 445/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 449/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 453/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 457/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 459/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 463/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 467/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 472/472 kB&#xD;Progress (4): 49 kB | 202 kB | 153 kB | 472 kB    &#xD;                                              &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-plugin-api/3.0/maven-plugin-api-3.0.jar (49 kB at 1.4 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/3.0/maven-core-3.0.jar&#xA;Progress (4): 202 kB | 153 kB | 472 kB | 4.1/165 kB&#xD;Progress (4): 202 kB | 153 kB | 472 kB | 7.7/165 kB&#xD;Progress (4): 202 kB | 153 kB | 472 kB | 12/165 kB &#xD;Progress (4): 202 kB | 153 kB | 472 kB | 16/165 kB&#xD;Progress (4): 202 kB | 153 kB | 472 kB | 20/165 kB&#xD;                                                  &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-bean/1.4.2/sisu-inject-bean-1.4.2.jar (153 kB at 3.6 MB/s)&#xA;Progress (3): 202 kB | 472 kB | 24/165 kB&#xD;                                         &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/3.0/maven-settings-3.0.jar&#xA;Progress (3): 202 kB | 472 kB | 28/165 kB&#xD;Progress (3): 202 kB | 472 kB | 32/165 kB&#xD;Progress (3): 202 kB | 472 kB | 36/165 kB&#xD;Progress (3): 202 kB | 472 kB | 40/165 kB&#xD;Progress (3): 202 kB | 472 kB | 45/165 kB&#xD;Progress (3): 202 kB | 472 kB | 49/165 kB&#xD;Progress (3): 202 kB | 472 kB | 53/165 kB&#xD;Progress (3): 202 kB | 472 kB | 57/165 kB&#xD;Progress (3): 202 kB | 472 kB | 61/165 kB&#xD;Progress (3): 202 kB | 472 kB | 65/165 kB&#xD;Progress (3): 202 kB | 472 kB | 69/165 kB&#xD;Progress (3): 202 kB | 472 kB | 73/165 kB&#xD;Progress (3): 202 kB | 472 kB | 77/165 kB&#xD;Progress (3): 202 kB | 472 kB | 81/165 kB&#xD;Progress (3): 202 kB | 472 kB | 85/165 kB&#xD;Progress (3): 202 kB | 472 kB | 89/165 kB&#xD;Progress (3): 202 kB | 472 kB | 93/165 kB&#xD;Progress (3): 202 kB | 472 kB | 98/165 kB&#xD;Progress (3): 202 kB | 472 kB | 102/165 kB&#xD;Progress (3): 202 kB | 472 kB | 106/165 kB&#xD;Progress (3): 202 kB | 472 kB | 110/165 kB&#xD;Progress (3): 202 kB | 472 kB | 114/165 kB&#xD;Progress (3): 202 kB | 472 kB | 118/165 kB&#xD;Progress (3): 202 kB | 472 kB | 122/165 kB&#xD;Progress (3): 202 kB | 472 kB | 126/165 kB&#xD;Progress (3): 202 kB | 472 kB | 130/165 kB&#xD;Progress (3): 202 kB | 472 kB | 134/165 kB&#xD;Progress (3): 202 kB | 472 kB | 139/165 kB&#xD;Progress (3): 202 kB | 472 kB | 143/165 kB&#xD;Progress (3): 202 kB | 472 kB | 147/165 kB&#xD;Progress (3): 202 kB | 472 kB | 151/165 kB&#xD;Progress (3): 202 kB | 472 kB | 155/165 kB&#xD;Progress (3): 202 kB | 472 kB | 159/165 kB&#xD;Progress (3): 202 kB | 472 kB | 163/165 kB&#xD;Progress (3): 202 kB | 472 kB | 165 kB    &#xD;                                      &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-inject-plexus/1.4.2/sisu-inject-plexus-1.4.2.jar (202 kB at 4.5 MB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/sisu/sisu-guice/2.1.7/sisu-guice-2.1.7-noaop.jar (472 kB at 10 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings-builder/3.0/maven-settings-builder-3.0.jar&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/3.0/maven-repository-metadata-3.0.jar&#xA;Progress (2): 165 kB | 4.1/527 kB&#xD;Progress (2): 165 kB | 7.7/527 kB&#xD;Progress (2): 165 kB | 12/527 kB &#xD;Progress (2): 165 kB | 16/527 kB&#xD;Progress (2): 165 kB | 20/527 kB&#xD;Progress (2): 165 kB | 24/527 kB&#xD;Progress (2): 165 kB | 28/527 kB&#xD;Progress (2): 165 kB | 32/527 kB&#xD;Progress (2): 165 kB | 36/527 kB&#xD;Progress (2): 165 kB | 40/527 kB&#xD;Progress (2): 165 kB | 44/527 kB&#xD;Progress (2): 165 kB | 48/527 kB&#xD;Progress (2): 165 kB | 53/527 kB&#xD;Progress (2): 165 kB | 57/527 kB&#xD;Progress (2): 165 kB | 61/527 kB&#xD;Progress (2): 165 kB | 65/527 kB&#xD;Progress (2): 165 kB | 69/527 kB&#xD;Progress (2): 165 kB | 73/527 kB&#xD;Progress (2): 165 kB | 77/527 kB&#xD;Progress (2): 165 kB | 81/527 kB&#xD;Progress (2): 165 kB | 85/527 kB&#xD;Progress (2): 165 kB | 89/527 kB&#xD;Progress (2): 165 kB | 93/527 kB&#xD;Progress (2): 165 kB | 98/527 kB&#xD;Progress (2): 165 kB | 102/527 kB&#xD;Progress (2): 165 kB | 106/527 kB&#xD;Progress (2): 165 kB | 110/527 kB&#xD;Progress (2): 165 kB | 114/527 kB&#xD;Progress (2): 165 kB | 118/527 kB&#xD;Progress (2): 165 kB | 122/527 kB&#xD;Progress (2): 165 kB | 126/527 kB&#xD;Progress (2): 165 kB | 130/527 kB&#xD;Progress (2): 165 kB | 134/527 kB&#xD;Progress (2): 165 kB | 139/527 kB&#xD;Progress (2): 165 kB | 143/527 kB&#xD;Progress (2): 165 kB | 147/527 kB&#xD;Progress (2): 165 kB | 151/527 kB&#xD;Progress (2): 165 kB | 155/527 kB&#xD;Progress (2): 165 kB | 159/527 kB&#xD;Progress (2): 165 kB | 163/527 kB&#xD;Progress (2): 165 kB | 167/527 kB&#xD;Progress (2): 165 kB | 171/527 kB&#xD;Progress (2): 165 kB | 175/527 kB&#xD;Progress (2): 165 kB | 179/527 kB&#xD;Progress (2): 165 kB | 184/527 kB&#xD;Progress (2): 165 kB | 188/527 kB&#xD;Progress (2): 165 kB | 192/527 kB&#xD;Progress (2): 165 kB | 196/527 kB&#xD;Progress (2): 165 kB | 200/527 kB&#xD;Progress (2): 165 kB | 204/527 kB&#xD;Progress (2): 165 kB | 208/527 kB&#xD;Progress (2): 165 kB | 212/527 kB&#xD;Progress (2): 165 kB | 216/527 kB&#xD;Progress (2): 165 kB | 220/527 kB&#xD;Progress (2): 165 kB | 225/527 kB&#xD;Progress (2): 165 kB | 229/527 kB&#xD;Progress (2): 165 kB | 233/527 kB&#xD;Progress (2): 165 kB | 237/527 kB&#xD;Progress (2): 165 kB | 241/527 kB&#xD;Progress (2): 165 kB | 245/527 kB&#xD;Progress (2): 165 kB | 249/527 kB&#xD;Progress (2): 165 kB | 253/527 kB&#xD;Progress (2): 165 kB | 257/527 kB&#xD;Progress (2): 165 kB | 261/527 kB&#xD;Progress (2): 165 kB | 266/527 kB&#xD;Progress (2): 165 kB | 270/527 kB&#xD;Progress (2): 165 kB | 274/527 kB&#xD;Progress (2): 165 kB | 278/527 kB&#xD;Progress (2): 165 kB | 282/527 kB&#xD;Progress (2): 165 kB | 286/527 kB&#xD;Progress (2): 165 kB | 290/527 kB&#xD;Progress (2): 165 kB | 294/527 kB&#xD;Progress (2): 165 kB | 298/527 kB&#xD;Progress (2): 165 kB | 302/527 kB&#xD;Progress (2): 165 kB | 306/527 kB&#xD;Progress (2): 165 kB | 311/527 kB&#xD;Progress (2): 165 kB | 315/527 kB&#xD;Progress (2): 165 kB | 319/527 kB&#xD;Progress (2): 165 kB | 323/527 kB&#xD;Progress (2): 165 kB | 327/527 kB&#xD;Progress (2): 165 kB | 331/527 kB&#xD;Progress (2): 165 kB | 335/527 kB&#xD;Progress (2): 165 kB | 339/527 kB&#xD;Progress (2): 165 kB | 343/527 kB&#xD;Progress (2): 165 kB | 347/527 kB&#xD;Progress (2): 165 kB | 352/527 kB&#xD;Progress (2): 165 kB | 356/527 kB&#xD;Progress (2): 165 kB | 360/527 kB&#xD;Progress (2): 165 kB | 364/527 kB&#xD;Progress (2): 165 kB | 368/527 kB&#xD;Progress (2): 165 kB | 372/527 kB&#xD;Progress (2): 165 kB | 376/527 kB&#xD;Progress (2): 165 kB | 380/527 kB&#xD;Progress (2): 165 kB | 384/527 kB&#xD;Progress (2): 165 kB | 388/527 kB&#xD;Progress (2): 165 kB | 392/527 kB&#xD;Progress (2): 165 kB | 397/527 kB&#xD;Progress (2): 165 kB | 401/527 kB&#xD;Progress (2): 165 kB | 405/527 kB&#xD;Progress (2): 165 kB | 409/527 kB&#xD;Progress (2): 165 kB | 413/527 kB&#xD;Progress (2): 165 kB | 417/527 kB&#xD;Progress (2): 165 kB | 421/527 kB&#xD;Progress (2): 165 kB | 425/527 kB&#xD;Progress (2): 165 kB | 429/527 kB&#xD;Progress (2): 165 kB | 433/527 kB&#xD;Progress (2): 165 kB | 438/527 kB&#xD;Progress (2): 165 kB | 442/527 kB&#xD;Progress (2): 165 kB | 446/527 kB&#xD;Progress (2): 165 kB | 450/527 kB&#xD;Progress (2): 165 kB | 454/527 kB&#xD;Progress (2): 165 kB | 458/527 kB&#xD;Progress (2): 165 kB | 462/527 kB&#xD;Progress (2): 165 kB | 466/527 kB&#xD;Progress (2): 165 kB | 470/527 kB&#xD;Progress (2): 165 kB | 474/527 kB&#xD;Progress (2): 165 kB | 479/527 kB&#xD;Progress (2): 165 kB | 483/527 kB&#xD;Progress (2): 165 kB | 487/527 kB&#xD;Progress (2): 165 kB | 491/527 kB&#xD;Progress (2): 165 kB | 495/527 kB&#xD;Progress (2): 165 kB | 499/527 kB&#xD;Progress (2): 165 kB | 503/527 kB&#xD;Progress (2): 165 kB | 507/527 kB&#xD;Progress (2): 165 kB | 511/527 kB&#xD;Progress (2): 165 kB | 515/527 kB&#xD;Progress (2): 165 kB | 519/527 kB&#xD;Progress (2): 165 kB | 524/527 kB&#xD;Progress (2): 165 kB | 527 kB    &#xD;Progress (3): 165 kB | 527 kB | 4.1/47 kB&#xD;Progress (3): 165 kB | 527 kB | 7.7/47 kB&#xD;Progress (3): 165 kB | 527 kB | 12/47 kB &#xD;Progress (3): 165 kB | 527 kB | 16/47 kB&#xD;Progress (3): 165 kB | 527 kB | 20/47 kB&#xD;Progress (3): 165 kB | 527 kB | 24/47 kB&#xD;Progress (3): 165 kB | 527 kB | 28/47 kB&#xD;Progress (3): 165 kB | 527 kB | 32/47 kB&#xD;Progress (3): 165 kB | 527 kB | 36/47 kB&#xD;Progress (3): 165 kB | 527 kB | 40/47 kB&#xD;Progress (3): 165 kB | 527 kB | 44/47 kB&#xD;Progress (3): 165 kB | 527 kB | 47 kB   &#xD;Progress (4): 165 kB | 527 kB | 47 kB | 4.1/38 kB&#xD;Progress (4): 165 kB | 527 kB | 47 kB | 7.7/38 kB&#xD;Progress (4): 165 kB | 527 kB | 47 kB | 12/38 kB &#xD;Progress (4): 165 kB | 527 kB | 47 kB | 16/38 kB&#xD;Progress (4): 165 kB | 527 kB | 47 kB | 20/38 kB&#xD;Progress (4): 165 kB | 527 kB | 47 kB | 24/38 kB&#xD;Progress (4): 165 kB | 527 kB | 47 kB | 28/38 kB&#xD;Progress (4): 165 kB | 527 kB | 47 kB | 32/38 kB&#xD;Progress (4): 165 kB | 527 kB | 47 kB | 36/38 kB&#xD;Progress (4): 165 kB | 527 kB | 47 kB | 38 kB   &#xD;Progress (5): 165 kB | 527 kB | 47 kB | 38 kB | 4.1/30 kB&#xD;Progress (5): 165 kB | 527 kB | 47 kB | 38 kB | 7.7/30 kB&#xD;Progress (5): 165 kB | 527 kB | 47 kB | 38 kB | 12/30 kB &#xD;Progress (5): 165 kB | 527 kB | 47 kB | 38 kB | 16/30 kB&#xD;Progress (5): 165 kB | 527 kB | 47 kB | 38 kB | 20/30 kB&#xD;Progress (5): 165 kB | 527 kB | 47 kB | 38 kB | 24/30 kB&#xD;Progress (5): 165 kB | 527 kB | 47 kB | 38 kB | 28/30 kB&#xD;Progress (5): 165 kB | 527 kB | 47 kB | 38 kB | 30 kB   &#xD;                                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-core/3.0/maven-core-3.0.jar (527 kB at 7.9 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model-builder/3.0/maven-model-builder-3.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings/3.0/maven-settings-3.0.jar (47 kB at 648 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-aether-provider/3.0/maven-aether-provider-3.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-settings-builder/3.0/maven-settings-builder-3.0.jar (38 kB at 511 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-impl/1.7/aether-impl-1.7.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-repository-metadata/3.0/maven-repository-metadata-3.0.jar (30 kB at 376 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-spi/1.7/aether-spi-1.7.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model/3.0/maven-model-3.0.jar (165 kB at 2.0 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-api/1.7/aether-api-1.7.jar&#xA;Progress (1): 4.1/148 kB&#xD;Progress (1): 7.7/148 kB&#xD;Progress (1): 12/148 kB &#xD;Progress (1): 16/148 kB&#xD;Progress (1): 20/148 kB&#xD;Progress (1): 24/148 kB&#xD;Progress (1): 28/148 kB&#xD;Progress (1): 32/148 kB&#xD;Progress (1): 36/148 kB&#xD;Progress (1): 40/148 kB&#xD;Progress (1): 45/148 kB&#xD;Progress (1): 49/148 kB&#xD;Progress (1): 53/148 kB&#xD;Progress (1): 57/148 kB&#xD;Progress (1): 61/148 kB&#xD;Progress (1): 65/148 kB&#xD;Progress (1): 69/148 kB&#xD;Progress (1): 73/148 kB&#xD;Progress (1): 77/148 kB&#xD;Progress (1): 81/148 kB&#xD;Progress (1): 86/148 kB&#xD;Progress (1): 90/148 kB&#xD;Progress (1): 94/148 kB&#xD;Progress (1): 98/148 kB&#xD;Progress (1): 102/148 kB&#xD;Progress (1): 106/148 kB&#xD;Progress (1): 110/148 kB&#xD;Progress (1): 114/148 kB&#xD;Progress (1): 118/148 kB&#xD;Progress (1): 122/148 kB&#xD;Progress (1): 126/148 kB&#xD;Progress (1): 131/148 kB&#xD;Progress (1): 135/148 kB&#xD;Progress (1): 139/148 kB&#xD;Progress (1): 143/148 kB&#xD;Progress (1): 147/148 kB&#xD;Progress (1): 148 kB    &#xD;Progress (2): 148 kB | 3.4/51 kB&#xD;Progress (2): 148 kB | 7.5/51 kB&#xD;Progress (2): 148 kB | 12/51 kB &#xD;Progress (2): 148 kB | 16/51 kB&#xD;Progress (2): 148 kB | 20/51 kB&#xD;Progress (2): 148 kB | 24/51 kB&#xD;Progress (2): 148 kB | 28/51 kB&#xD;Progress (2): 148 kB | 32/51 kB&#xD;Progress (2): 148 kB | 36/51 kB&#xD;Progress (2): 148 kB | 40/51 kB&#xD;Progress (2): 148 kB | 44/51 kB&#xD;Progress (2): 148 kB | 48/51 kB&#xD;Progress (2): 148 kB | 51 kB   &#xD;Progress (3): 148 kB | 51 kB | 4.1/106 kB&#xD;Progress (3): 148 kB | 51 kB | 7.7/106 kB&#xD;Progress (3): 148 kB | 51 kB | 12/106 kB &#xD;Progress (3): 148 kB | 51 kB | 16/106 kB&#xD;Progress (3): 148 kB | 51 kB | 20/106 kB&#xD;Progress (3): 148 kB | 51 kB | 24/106 kB&#xD;Progress (3): 148 kB | 51 kB | 28/106 kB&#xD;Progress (3): 148 kB | 51 kB | 32/106 kB&#xD;Progress (3): 148 kB | 51 kB | 36/106 kB&#xD;Progress (3): 148 kB | 51 kB | 40/106 kB&#xD;Progress (3): 148 kB | 51 kB | 45/106 kB&#xD;Progress (3): 148 kB | 51 kB | 49/106 kB&#xD;Progress (3): 148 kB | 51 kB | 53/106 kB&#xD;Progress (3): 148 kB | 51 kB | 57/106 kB&#xD;Progress (3): 148 kB | 51 kB | 61/106 kB&#xD;Progress (3): 148 kB | 51 kB | 65/106 kB&#xD;Progress (3): 148 kB | 51 kB | 69/106 kB&#xD;Progress (3): 148 kB | 51 kB | 73/106 kB&#xD;Progress (3): 148 kB | 51 kB | 77/106 kB&#xD;Progress (3): 148 kB | 51 kB | 81/106 kB&#xD;Progress (3): 148 kB | 51 kB | 86/106 kB&#xD;Progress (3): 148 kB | 51 kB | 90/106 kB&#xD;Progress (3): 148 kB | 51 kB | 94/106 kB&#xD;Progress (3): 148 kB | 51 kB | 98/106 kB&#xD;Progress (3): 148 kB | 51 kB | 102/106 kB&#xD;Progress (3): 148 kB | 51 kB | 106/106 kB&#xD;Progress (3): 148 kB | 51 kB | 106 kB    &#xD;Progress (4): 148 kB | 51 kB | 106 kB | 4.1/14 kB&#xD;Progress (4): 148 kB | 51 kB | 106 kB | 7.5/14 kB&#xD;Progress (4): 148 kB | 51 kB | 106 kB | 12/14 kB &#xD;Progress (4): 148 kB | 51 kB | 106 kB | 14 kB   &#xD;                                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-model-builder/3.0/maven-model-builder-3.0.jar (148 kB at 1.5 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-util/1.7/aether-util-1.7.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-aether-provider/3.0/maven-aether-provider-3.0.jar (51 kB at 492 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.14/plexus-interpolation-1.14.jar&#xA;Progress (3): 106 kB | 14 kB | 4.1/74 kB&#xD;Progress (3): 106 kB | 14 kB | 7.7/74 kB&#xD;Progress (3): 106 kB | 14 kB | 12/74 kB &#xD;Progress (3): 106 kB | 14 kB | 16/74 kB&#xD;Progress (3): 106 kB | 14 kB | 20/74 kB&#xD;Progress (3): 106 kB | 14 kB | 24/74 kB&#xD;Progress (3): 106 kB | 14 kB | 28/74 kB&#xD;Progress (3): 106 kB | 14 kB | 32/74 kB&#xD;Progress (3): 106 kB | 14 kB | 36/74 kB&#xD;Progress (3): 106 kB | 14 kB | 40/74 kB&#xD;Progress (3): 106 kB | 14 kB | 44/74 kB&#xD;Progress (3): 106 kB | 14 kB | 48/74 kB&#xD;Progress (3): 106 kB | 14 kB | 53/74 kB&#xD;Progress (3): 106 kB | 14 kB | 57/74 kB&#xD;Progress (3): 106 kB | 14 kB | 61/74 kB&#xD;Progress (3): 106 kB | 14 kB | 65/74 kB&#xD;Progress (3): 106 kB | 14 kB | 69/74 kB&#xD;Progress (3): 106 kB | 14 kB | 73/74 kB&#xD;Progress (3): 106 kB | 14 kB | 74 kB   &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-spi/1.7/aether-spi-1.7.jar (14 kB at 114 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.3/plexus-classworlds-2.2.3.jar&#xA;Progress (3): 106 kB | 74 kB | 4.1/108 kB&#xD;Progress (3): 106 kB | 74 kB | 8.2/108 kB&#xD;Progress (3): 106 kB | 74 kB | 12/108 kB &#xD;Progress (3): 106 kB | 74 kB | 16/108 kB&#xD;Progress (3): 106 kB | 74 kB | 20/108 kB&#xD;Progress (3): 106 kB | 74 kB | 25/108 kB&#xD;Progress (3): 106 kB | 74 kB | 29/108 kB&#xD;Progress (3): 106 kB | 74 kB | 33/108 kB&#xD;Progress (3): 106 kB | 74 kB | 37/108 kB&#xD;Progress (3): 106 kB | 74 kB | 41/108 kB&#xD;Progress (3): 106 kB | 74 kB | 45/108 kB&#xD;Progress (3): 106 kB | 74 kB | 49/108 kB&#xD;Progress (3): 106 kB | 74 kB | 53/108 kB&#xD;Progress (3): 106 kB | 74 kB | 57/108 kB&#xD;Progress (3): 106 kB | 74 kB | 61/108 kB&#xD;Progress (3): 106 kB | 74 kB | 66/108 kB&#xD;Progress (3): 106 kB | 74 kB | 70/108 kB&#xD;Progress (3): 106 kB | 74 kB | 74/108 kB&#xD;Progress (3): 106 kB | 74 kB | 78/108 kB&#xD;Progress (3): 106 kB | 74 kB | 82/108 kB&#xD;Progress (3): 106 kB | 74 kB | 86/108 kB&#xD;Progress (3): 106 kB | 74 kB | 90/108 kB&#xD;Progress (3): 106 kB | 74 kB | 94/108 kB&#xD;Progress (3): 106 kB | 74 kB | 98/108 kB&#xD;Progress (3): 106 kB | 74 kB | 102/108 kB&#xD;Progress (3): 106 kB | 74 kB | 106/108 kB&#xD;Progress (3): 106 kB | 74 kB | 108 kB    &#xD;Progress (4): 106 kB | 74 kB | 108 kB | 4.1/61 kB&#xD;Progress (4): 106 kB | 74 kB | 108 kB | 7.7/61 kB&#xD;Progress (4): 106 kB | 74 kB | 108 kB | 12/61 kB &#xD;Progress (4): 106 kB | 74 kB | 108 kB | 16/61 kB&#xD;Progress (4): 106 kB | 74 kB | 108 kB | 20/61 kB&#xD;Progress (4): 106 kB | 74 kB | 108 kB | 24/61 kB&#xD;Progress (4): 106 kB | 74 kB | 108 kB | 28/61 kB&#xD;Progress (4): 106 kB | 74 kB | 108 kB | 32/61 kB&#xD;Progress (4): 106 kB | 74 kB | 108 kB | 36/61 kB&#xD;Progress (4): 106 kB | 74 kB | 108 kB | 40/61 kB&#xD;Progress (4): 106 kB | 74 kB | 108 kB | 45/61 kB&#xD;Progress (4): 106 kB | 74 kB | 108 kB | 49/61 kB&#xD;Progress (4): 106 kB | 74 kB | 108 kB | 53/61 kB&#xD;Progress (4): 106 kB | 74 kB | 108 kB | 57/61 kB&#xD;Progress (4): 106 kB | 74 kB | 108 kB | 61/61 kB&#xD;Progress (4): 106 kB | 74 kB | 108 kB | 61 kB   &#xD;                                             &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-impl/1.7/aether-impl-1.7.jar (106 kB at 837 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/2.0.0/plexus-component-annotations-2.0.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-util/1.7/aether-util-1.7.jar (108 kB at 782 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-sec-dispatcher/1.3/plexus-sec-dispatcher-1.3.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/aether/aether-api/1.7/aether-api-1.7.jar (74 kB at 534 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-cipher/1.4/plexus-cipher-1.4.jar&#xA;Progress (2): 61 kB | 4.1/4.2 kB&#xD;Progress (2): 61 kB | 4.2 kB    &#xD;                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-interpolation/1.14/plexus-interpolation-1.14.jar (61 kB at 433 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/3.0/maven-artifact-3.0.jar&#xA;Progress (2): 4.2 kB | 4.1/46 kB&#xD;Progress (2): 4.2 kB | 7.7/46 kB&#xD;Progress (2): 4.2 kB | 12/46 kB &#xD;Progress (2): 4.2 kB | 16/46 kB&#xD;Progress (2): 4.2 kB | 20/46 kB&#xD;Progress (2): 4.2 kB | 24/46 kB&#xD;Progress (2): 4.2 kB | 28/46 kB&#xD;Progress (2): 4.2 kB | 32/46 kB&#xD;Progress (2): 4.2 kB | 36/46 kB&#xD;Progress (2): 4.2 kB | 40/46 kB&#xD;Progress (2): 4.2 kB | 44/46 kB&#xD;Progress (2): 4.2 kB | 46 kB   &#xD;                            &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-component-annotations/2.0.0/plexus-component-annotations-2.0.0.jar (4.2 kB at 27 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.3.0/plexus-utils-3.3.0.jar&#xA;Progress (2): 46 kB | 4.1/29 kB&#xD;Progress (2): 46 kB | 7.7/29 kB&#xD;Progress (2): 46 kB | 12/29 kB &#xD;Progress (2): 46 kB | 16/29 kB&#xD;Progress (2): 46 kB | 20/29 kB&#xD;Progress (2): 46 kB | 24/29 kB&#xD;Progress (2): 46 kB | 28/29 kB&#xD;Progress (2): 46 kB | 29 kB   &#xD;Progress (3): 46 kB | 29 kB | 4.1/52 kB&#xD;Progress (3): 46 kB | 29 kB | 7.7/52 kB&#xD;Progress (3): 46 kB | 29 kB | 12/52 kB &#xD;Progress (3): 46 kB | 29 kB | 16/52 kB&#xD;Progress (3): 46 kB | 29 kB | 20/52 kB&#xD;Progress (3): 46 kB | 29 kB | 24/52 kB&#xD;Progress (3): 46 kB | 29 kB | 28/52 kB&#xD;Progress (3): 46 kB | 29 kB | 32/52 kB&#xD;Progress (3): 46 kB | 29 kB | 36/52 kB&#xD;Progress (3): 46 kB | 29 kB | 40/52 kB&#xD;Progress (3): 46 kB | 29 kB | 45/52 kB&#xD;Progress (3): 46 kB | 29 kB | 49/52 kB&#xD;Progress (3): 46 kB | 29 kB | 52 kB   &#xD;                                   &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-classworlds/2.2.3/plexus-classworlds-2.2.3.jar (46 kB at 274 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-artifact-transfer/0.12.0/maven-artifact-transfer-0.12.0.jar&#xA;Progress (3): 29 kB | 52 kB | 4.1/263 kB&#xD;Progress (3): 29 kB | 52 kB | 7.7/263 kB&#xD;Progress (3): 29 kB | 52 kB | 12/263 kB &#xD;Progress (3): 29 kB | 52 kB | 16/263 kB&#xD;Progress (3): 29 kB | 52 kB | 20/263 kB&#xD;Progress (3): 29 kB | 52 kB | 24/263 kB&#xD;Progress (4): 29 kB | 52 kB | 24/263 kB | 4.1/13 kB&#xD;Progress (4): 29 kB | 52 kB | 28/263 kB | 4.1/13 kB&#xD;Progress (4): 29 kB | 52 kB | 32/263 kB | 4.1/13 kB&#xD;Progress (4): 29 kB | 52 kB | 32/263 kB | 7.7/13 kB&#xD;Progress (4): 29 kB | 52 kB | 36/263 kB | 7.7/13 kB&#xD;Progress (4): 29 kB | 52 kB | 40/263 kB | 7.7/13 kB&#xD;Progress (4): 29 kB | 52 kB | 40/263 kB | 12/13 kB &#xD;Progress (4): 29 kB | 52 kB | 40/263 kB | 13 kB   &#xD;Progress (4): 29 kB | 52 kB | 45/263 kB | 13 kB&#xD;Progress (4): 29 kB | 52 kB | 49/263 kB | 13 kB&#xD;Progress (4): 29 kB | 52 kB | 53/263 kB | 13 kB&#xD;Progress (4): 29 kB | 52 kB | 57/263 kB | 13 kB&#xD;Progress (4): 29 kB | 52 kB | 61/263 kB | 13 kB&#xD;Progress (4): 29 kB | 52 kB | 65/263 kB | 13 kB&#xD;                                               &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-sec-dispatcher/1.3/plexus-sec-dispatcher-1.3.jar (29 kB at 168 kB/s)&#xA;Progress (3): 52 kB | 69/263 kB | 13 kB&#xD;                                       &#xD;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/3.0.1/maven-common-artifact-filters-3.0.1.jar&#xA;Progress (3): 52 kB | 73/263 kB | 13 kB&#xD;Progress (3): 52 kB | 77/263 kB | 13 kB&#xD;Progress (3): 52 kB | 81/263 kB | 13 kB&#xD;Progress (3): 52 kB | 86/263 kB | 13 kB&#xD;Progress (3): 52 kB | 90/263 kB | 13 kB&#xD;Progress (3): 52 kB | 94/263 kB | 13 kB&#xD;Progress (3): 52 kB | 98/263 kB | 13 kB&#xD;Progress (3): 52 kB | 102/263 kB | 13 kB&#xD;Progress (3): 52 kB | 106/263 kB | 13 kB&#xD;Progress (3): 52 kB | 110/263 kB | 13 kB&#xD;Progress (3): 52 kB | 114/263 kB | 13 kB&#xD;Progress (3): 52 kB | 118/263 kB | 13 kB&#xD;Progress (3): 52 kB | 122/263 kB | 13 kB&#xD;Progress (3): 52 kB | 126/263 kB | 13 kB&#xD;Progress (3): 52 kB | 131/263 kB | 13 kB&#xD;Progress (3): 52 kB | 135/263 kB | 13 kB&#xD;Progress (3): 52 kB | 139/263 kB | 13 kB&#xD;Progress (3): 52 kB | 143/263 kB | 13 kB&#xD;Progress (3): 52 kB | 147/263 kB | 13 kB&#xD;Progress (3): 52 kB | 151/263 kB | 13 kB&#xD;Progress (3): 52 kB | 155/263 kB | 13 kB&#xD;Progress (3): 52 kB | 159/263 kB | 13 kB&#xD;Progress (3): 52 kB | 163/263 kB | 13 kB&#xD;Progress (3): 52 kB | 167/263 kB | 13 kB&#xD;Progress (3): 52 kB | 172/263 kB | 13 kB&#xD;Progress (3): 52 kB | 176/263 kB | 13 kB&#xD;Progress (3): 52 kB | 180/263 kB | 13 kB&#xD;Progress (3): 52 kB | 184/263 kB | 13 kB&#xD;Progress (3): 52 kB | 188/263 kB | 13 kB&#xD;Progress (3): 52 kB | 192/263 kB | 13 kB&#xD;Progress (3): 52 kB | 196/263 kB | 13 kB&#xD;Progress (3): 52 kB | 200/263 kB | 13 kB&#xD;Progress (3): 52 kB | 204/263 kB | 13 kB&#xD;Progress (3): 52 kB | 208/263 kB | 13 kB&#xD;Progress (3): 52 kB | 213/263 kB | 13 kB&#xD;Progress (3): 52 kB | 217/263 kB | 13 kB&#xD;Progress (3): 52 kB | 221/263 kB | 13 kB&#xD;Progress (3): 52 kB | 225/263 kB | 13 kB&#xD;Progress (3): 52 kB | 229/263 kB | 13 kB&#xD;Progress (3): 52 kB | 233/263 kB | 13 kB&#xD;Progress (3): 52 kB | 237/263 kB | 13 kB&#xD;Progress (3): 52 kB | 241/263 kB | 13 kB&#xD;Progress (3): 52 kB | 245/263 kB | 13 kB&#xD;Progress (3): 52 kB | 249/263 kB | 13 kB&#xD;Progress (3): 52 kB | 253/263 kB | 13 kB&#xD;Progress (3): 52 kB | 258/263 kB | 13 kB&#xD;Progress (3): 52 kB | 262/263 kB | 13 kB&#xD;Progress (3): 52 kB | 263 kB | 13 kB    &#xD;                                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/maven-artifact/3.0/maven-artifact-3.0.jar (52 kB at 284 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/3.1.0/maven-shared-utils-3.1.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/sonatype/plexus/plexus-cipher/1.4/plexus-cipher-1.4.jar (13 kB at 73 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-codec/commons-codec/1.11/commons-codec-1.11.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/codehaus/plexus/plexus-utils/3.3.0/plexus-utils-3.3.0.jar (263 kB at 1.4 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.5/slf4j-api-1.7.5.jar&#xA;Progress (1): 4.1/120 kB&#xD;Progress (1): 7.7/120 kB&#xD;Progress (1): 12/120 kB &#xD;Progress (1): 16/120 kB&#xD;Progress (1): 20/120 kB&#xD;Progress (1): 24/120 kB&#xD;Progress (1): 28/120 kB&#xD;Progress (1): 32/120 kB&#xD;Progress (1): 36/120 kB&#xD;Progress (1): 40/120 kB&#xD;Progress (1): 44/120 kB&#xD;Progress (1): 48/120 kB&#xD;Progress (1): 53/120 kB&#xD;Progress (1): 57/120 kB&#xD;Progress (1): 61/120 kB&#xD;Progress (1): 65/120 kB&#xD;Progress (1): 69/120 kB&#xD;Progress (1): 73/120 kB&#xD;Progress (1): 77/120 kB&#xD;Progress (1): 81/120 kB&#xD;Progress (1): 85/120 kB&#xD;Progress (1): 89/120 kB&#xD;Progress (1): 93/120 kB&#xD;Progress (1): 98/120 kB&#xD;Progress (1): 102/120 kB&#xD;Progress (1): 106/120 kB&#xD;Progress (1): 110/120 kB&#xD;Progress (1): 114/120 kB&#xD;Progress (1): 118/120 kB&#xD;Progress (1): 120 kB    &#xD;Progress (2): 120 kB | 4.1/61 kB&#xD;Progress (2): 120 kB | 7.7/61 kB&#xD;Progress (2): 120 kB | 12/61 kB &#xD;Progress (2): 120 kB | 16/61 kB&#xD;Progress (2): 120 kB | 20/61 kB&#xD;Progress (2): 120 kB | 24/61 kB&#xD;Progress (2): 120 kB | 28/61 kB&#xD;Progress (2): 120 kB | 32/61 kB&#xD;Progress (2): 120 kB | 36/61 kB&#xD;Progress (2): 120 kB | 40/61 kB&#xD;Progress (2): 120 kB | 45/61 kB&#xD;Progress (2): 120 kB | 49/61 kB&#xD;Progress (2): 120 kB | 53/61 kB&#xD;Progress (2): 120 kB | 57/61 kB&#xD;Progress (2): 120 kB | 61/61 kB&#xD;Progress (2): 120 kB | 61 kB   &#xD;Progress (3): 120 kB | 61 kB | 4.1/164 kB&#xD;Progress (3): 120 kB | 61 kB | 7.7/164 kB&#xD;Progress (3): 120 kB | 61 kB | 12/164 kB &#xD;Progress (3): 120 kB | 61 kB | 16/164 kB&#xD;Progress (3): 120 kB | 61 kB | 20/164 kB&#xD;Progress (3): 120 kB | 61 kB | 24/164 kB&#xD;Progress (3): 120 kB | 61 kB | 28/164 kB&#xD;Progress (3): 120 kB | 61 kB | 32/164 kB&#xD;Progress (3): 120 kB | 61 kB | 36/164 kB&#xD;Progress (3): 120 kB | 61 kB | 40/164 kB&#xD;Progress (3): 120 kB | 61 kB | 45/164 kB&#xD;Progress (3): 120 kB | 61 kB | 49/164 kB&#xD;Progress (3): 120 kB | 61 kB | 53/164 kB&#xD;Progress (3): 120 kB | 61 kB | 57/164 kB&#xD;Progress (3): 120 kB | 61 kB | 61/164 kB&#xD;Progress (3): 120 kB | 61 kB | 65/164 kB&#xD;Progress (3): 120 kB | 61 kB | 69/164 kB&#xD;Progress (3): 120 kB | 61 kB | 73/164 kB&#xD;Progress (3): 120 kB | 61 kB | 77/164 kB&#xD;Progress (3): 120 kB | 61 kB | 81/164 kB&#xD;Progress (3): 120 kB | 61 kB | 86/164 kB&#xD;Progress (3): 120 kB | 61 kB | 90/164 kB&#xD;Progress (3): 120 kB | 61 kB | 94/164 kB&#xD;Progress (3): 120 kB | 61 kB | 98/164 kB&#xD;Progress (4): 120 kB | 61 kB | 98/164 kB | 4.1/26 kB&#xD;Progress (4): 120 kB | 61 kB | 98/164 kB | 7.7/26 kB&#xD;Progress (4): 120 kB | 61 kB | 98/164 kB | 12/26 kB &#xD;Progress (4): 120 kB | 61 kB | 98/164 kB | 16/26 kB&#xD;Progress (4): 120 kB | 61 kB | 98/164 kB | 20/26 kB&#xD;Progress (4): 120 kB | 61 kB | 98/164 kB | 24/26 kB&#xD;Progress (4): 120 kB | 61 kB | 98/164 kB | 26 kB   &#xD;Progress (4): 120 kB | 61 kB | 102/164 kB | 26 kB&#xD;Progress (4): 120 kB | 61 kB | 106/164 kB | 26 kB&#xD;Progress (4): 120 kB | 61 kB | 110/164 kB | 26 kB&#xD;Progress (4): 120 kB | 61 kB | 114/164 kB | 26 kB&#xD;Progress (4): 120 kB | 61 kB | 118/164 kB | 26 kB&#xD;Progress (4): 120 kB | 61 kB | 122/164 kB | 26 kB&#xD;Progress (4): 120 kB | 61 kB | 126/164 kB | 26 kB&#xD;Progress (4): 120 kB | 61 kB | 131/164 kB | 26 kB&#xD;Progress (4): 120 kB | 61 kB | 135/164 kB | 26 kB&#xD;Progress (4): 120 kB | 61 kB | 139/164 kB | 26 kB&#xD;Progress (4): 120 kB | 61 kB | 143/164 kB | 26 kB&#xD;Progress (5): 120 kB | 61 kB | 143/164 kB | 26 kB | 4.1/335 kB&#xD;Progress (5): 120 kB | 61 kB | 147/164 kB | 26 kB | 4.1/335 kB&#xD;Progress (5): 120 kB | 61 kB | 147/164 kB | 26 kB | 7.7/335 kB&#xD;Progress (5): 120 kB | 61 kB | 147/164 kB | 26 kB | 12/335 kB &#xD;Progress (5): 120 kB | 61 kB | 147/164 kB | 26 kB | 16/335 kB&#xD;Progress (5): 120 kB | 61 kB | 147/164 kB | 26 kB | 20/335 kB&#xD;Progress (5): 120 kB | 61 kB | 147/164 kB | 26 kB | 24/335 kB&#xD;Progress (5): 120 kB | 61 kB | 147/164 kB | 26 kB | 28/335 kB&#xD;Progress (5): 120 kB | 61 kB | 147/164 kB | 26 kB | 32/335 kB&#xD;Progress (5): 120 kB | 61 kB | 147/164 kB | 26 kB | 36/335 kB&#xD;Progress (5): 120 kB | 61 kB | 147/164 kB | 26 kB | 40/335 kB&#xD;Progress (5): 120 kB | 61 kB | 151/164 kB | 26 kB | 40/335 kB&#xD;Progress (5): 120 kB | 61 kB | 151/164 kB | 26 kB | 45/335 kB&#xD;Progress (5): 120 kB | 61 kB | 155/164 kB | 26 kB | 45/335 kB&#xD;Progress (5): 120 kB | 61 kB | 159/164 kB | 26 kB | 45/335 kB&#xD;Progress (5): 120 kB | 61 kB | 159/164 kB | 26 kB | 49/335 kB&#xD;Progress (5): 120 kB | 61 kB | 163/164 kB | 26 kB | 49/335 kB&#xD;Progress (5): 120 kB | 61 kB | 163/164 kB | 26 kB | 53/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 53/335 kB    &#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 57/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 61/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 65/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 69/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 73/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 77/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 81/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 86/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 90/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 94/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 98/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 102/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 106/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 110/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 114/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 118/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 122/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 126/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 131/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 135/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 139/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 143/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 147/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 151/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 155/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 159/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 163/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 167/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 172/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 176/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 180/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 184/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 188/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 192/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 196/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 200/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 204/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 208/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 213/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 217/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 221/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 225/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 229/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 233/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 237/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 241/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 245/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 249/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 253/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 258/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 262/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 266/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 270/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 274/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 278/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 282/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 286/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 290/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 294/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 299/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 303/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 307/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 311/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 315/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 319/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 323/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 327/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 331/335 kB&#xD;Progress (5): 120 kB | 61 kB | 164 kB | 26 kB | 335 kB    &#xD;                                                      &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-artifact-transfer/0.12.0/maven-artifact-transfer-0.12.0.jar (120 kB at 573 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm/8.0/asm-8.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-common-artifact-filters/3.0.1/maven-common-artifact-filters-3.0.1.jar (61 kB at 290 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-commons/8.0/asm-commons-8.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/slf4j/slf4j-api/1.7.5/slf4j-api-1.7.5.jar (26 kB at 121 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-tree/8.0/asm-tree-8.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-shared-utils/3.1.0/maven-shared-utils-3.1.0.jar (164 kB at 751 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-analysis/8.0/asm-analysis-8.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/commons-codec/commons-codec/1.11/commons-codec-1.11.jar (335 kB at 1.5 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/jdom/jdom2/2.0.6/jdom2-2.0.6.jar&#xA;Progress (1): 4.1/122 kB&#xD;Progress (1): 8.2/122 kB&#xD;Progress (1): 12/122 kB &#xD;Progress (1): 16/122 kB&#xD;Progress (1): 20/122 kB&#xD;Progress (1): 25/122 kB&#xD;Progress (1): 29/122 kB&#xD;Progress (1): 33/122 kB&#xD;Progress (1): 37/122 kB&#xD;Progress (1): 41/122 kB&#xD;Progress (1): 45/122 kB&#xD;Progress (1): 49/122 kB&#xD;Progress (1): 53/122 kB&#xD;Progress (1): 57/122 kB&#xD;Progress (2): 57/122 kB | 4.1/53 kB&#xD;Progress (2): 61/122 kB | 4.1/53 kB&#xD;Progress (2): 66/122 kB | 4.1/53 kB&#xD;Progress (2): 66/122 kB | 7.7/53 kB&#xD;Progress (2): 70/122 kB | 7.7/53 kB&#xD;Progress (2): 70/122 kB | 12/53 kB &#xD;Progress (2): 74/122 kB | 12/53 kB&#xD;Progress (2): 74/122 kB | 16/53 kB&#xD;Progress (2): 78/122 kB | 16/53 kB&#xD;Progress (2): 82/122 kB | 16/53 kB&#xD;Progress (2): 82/122 kB | 20/53 kB&#xD;Progress (2): 86/122 kB | 20/53 kB&#xD;Progress (2): 86/122 kB | 24/53 kB&#xD;Progress (2): 90/122 kB | 24/53 kB&#xD;Progress (2): 90/122 kB | 28/53 kB&#xD;Progress (2): 90/122 kB | 32/53 kB&#xD;Progress (2): 94/122 kB | 32/53 kB&#xD;Progress (2): 98/122 kB | 32/53 kB&#xD;Progress (2): 98/122 kB | 36/53 kB&#xD;Progress (2): 102/122 kB | 36/53 kB&#xD;Progress (2): 102/122 kB | 40/53 kB&#xD;Progress (2): 106/122 kB | 40/53 kB&#xD;Progress (2): 106/122 kB | 45/53 kB&#xD;Progress (2): 111/122 kB | 45/53 kB&#xD;Progress (2): 111/122 kB | 49/53 kB&#xD;Progress (2): 115/122 kB | 49/53 kB&#xD;Progress (2): 119/122 kB | 49/53 kB&#xD;Progress (2): 119/122 kB | 53 kB   &#xD;Progress (2): 122 kB | 53 kB    &#xD;Progress (3): 122 kB | 53 kB | 4.1/33 kB&#xD;Progress (3): 122 kB | 53 kB | 7.7/33 kB&#xD;Progress (3): 122 kB | 53 kB | 12/33 kB &#xD;Progress (3): 122 kB | 53 kB | 16/33 kB&#xD;Progress (3): 122 kB | 53 kB | 20/33 kB&#xD;Progress (3): 122 kB | 53 kB | 24/33 kB&#xD;Progress (3): 122 kB | 53 kB | 28/33 kB&#xD;Progress (3): 122 kB | 53 kB | 32/33 kB&#xD;Progress (3): 122 kB | 53 kB | 33 kB   &#xD;Progress (4): 122 kB | 53 kB | 33 kB | 4.1/72 kB&#xD;Progress (4): 122 kB | 53 kB | 33 kB | 7.7/72 kB&#xD;Progress (4): 122 kB | 53 kB | 33 kB | 12/72 kB &#xD;Progress (4): 122 kB | 53 kB | 33 kB | 16/72 kB&#xD;Progress (4): 122 kB | 53 kB | 33 kB | 20/72 kB&#xD;Progress (4): 122 kB | 53 kB | 33 kB | 24/72 kB&#xD;Progress (4): 122 kB | 53 kB | 33 kB | 28/72 kB&#xD;Progress (4): 122 kB | 53 kB | 33 kB | 32/72 kB&#xD;Progress (4): 122 kB | 53 kB | 33 kB | 36/72 kB&#xD;Progress (4): 122 kB | 53 kB | 33 kB | 40/72 kB&#xD;Progress (4): 122 kB | 53 kB | 33 kB | 45/72 kB&#xD;Progress (4): 122 kB | 53 kB | 33 kB | 49/72 kB&#xD;Progress (4): 122 kB | 53 kB | 33 kB | 53/72 kB&#xD;Progress (4): 122 kB | 53 kB | 33 kB | 57/72 kB&#xD;Progress (4): 122 kB | 53 kB | 33 kB | 61/72 kB&#xD;Progress (4): 122 kB | 53 kB | 33 kB | 65/72 kB&#xD;Progress (4): 122 kB | 53 kB | 33 kB | 69/72 kB&#xD;Progress (4): 122 kB | 53 kB | 33 kB | 72 kB   &#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 4.1/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 7.7/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 12/305 kB &#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 16/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 20/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 24/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 28/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 32/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 36/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 40/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 45/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 49/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 53/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 57/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 61/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 65/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 69/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 73/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 77/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 81/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 86/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 90/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 94/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 98/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 102/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 106/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 110/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 114/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 118/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 122/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 126/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 131/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 135/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 139/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 143/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 147/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 151/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 155/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 159/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 163/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 167/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 172/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 176/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 180/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 184/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 188/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 192/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 196/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 200/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 204/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 208/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 212/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 217/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 221/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 225/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 229/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 233/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 237/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 240/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 244/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 248/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 252/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 256/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 260/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 265/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 269/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 273/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 277/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 281/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 285/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 289/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 293/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 297/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 301/305 kB&#xD;Progress (5): 122 kB | 53 kB | 33 kB | 72 kB | 305 kB    &#xD;                                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-analysis/8.0/asm-analysis-8.0.jar (33 kB at 133 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-dependency-tree/3.0.1/maven-dependency-tree-3.0.1.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm/8.0/asm-8.0.jar (122 kB at 485 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether-util/0.9.0.M2/aether-util-0.9.0.M2.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-tree/8.0/asm-tree-8.0.jar (53 kB at 209 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.6/commons-io-2.6.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/jdom/jdom2/2.0.6/jdom2-2.0.6.jar (305 kB at 1.2 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/vafer/jdependency/2.4.0/jdependency-2.4.0.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-commons/8.0/asm-commons-8.0.jar (72 kB at 271 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-util/8.0/asm-util-8.0.jar&#xA;Progress (1): 4.1/215 kB&#xD;Progress (1): 7.7/215 kB&#xD;Progress (1): 12/215 kB &#xD;Progress (1): 16/215 kB&#xD;Progress (1): 20/215 kB&#xD;Progress (1): 24/215 kB&#xD;Progress (1): 28/215 kB&#xD;Progress (1): 32/215 kB&#xD;Progress (1): 36/215 kB&#xD;Progress (1): 40/215 kB&#xD;Progress (1): 45/215 kB&#xD;Progress (1): 49/215 kB&#xD;Progress (1): 53/215 kB&#xD;Progress (1): 57/215 kB&#xD;Progress (1): 61/215 kB&#xD;Progress (1): 65/215 kB&#xD;Progress (1): 69/215 kB&#xD;Progress (1): 73/215 kB&#xD;Progress (1): 77/215 kB&#xD;Progress (1): 81/215 kB&#xD;Progress (1): 86/215 kB&#xD;Progress (1): 90/215 kB&#xD;Progress (2): 90/215 kB | 4.1/37 kB&#xD;Progress (2): 94/215 kB | 4.1/37 kB&#xD;Progress (2): 94/215 kB | 7.7/37 kB&#xD;Progress (2): 98/215 kB | 7.7/37 kB&#xD;Progress (2): 98/215 kB | 12/37 kB &#xD;Progress (2): 102/215 kB | 12/37 kB&#xD;Progress (2): 102/215 kB | 16/37 kB&#xD;Progress (2): 106/215 kB | 16/37 kB&#xD;Progress (2): 110/215 kB | 16/37 kB&#xD;Progress (2): 110/215 kB | 20/37 kB&#xD;Progress (2): 114/215 kB | 20/37 kB&#xD;Progress (2): 114/215 kB | 24/37 kB&#xD;Progress (2): 118/215 kB | 24/37 kB&#xD;Progress (2): 118/215 kB | 28/37 kB&#xD;Progress (2): 122/215 kB | 28/37 kB&#xD;Progress (2): 122/215 kB | 32/37 kB&#xD;Progress (2): 126/215 kB | 32/37 kB&#xD;Progress (2): 126/215 kB | 36/37 kB&#xD;Progress (2): 131/215 kB | 36/37 kB&#xD;Progress (2): 131/215 kB | 37 kB   &#xD;Progress (2): 135/215 kB | 37 kB&#xD;Progress (2): 139/215 kB | 37 kB&#xD;Progress (2): 143/215 kB | 37 kB&#xD;Progress (2): 147/215 kB | 37 kB&#xD;Progress (2): 151/215 kB | 37 kB&#xD;Progress (2): 155/215 kB | 37 kB&#xD;Progress (2): 159/215 kB | 37 kB&#xD;Progress (2): 163/215 kB | 37 kB&#xD;Progress (2): 167/215 kB | 37 kB&#xD;Progress (2): 172/215 kB | 37 kB&#xD;Progress (2): 176/215 kB | 37 kB&#xD;Progress (2): 180/215 kB | 37 kB&#xD;Progress (2): 184/215 kB | 37 kB&#xD;Progress (2): 188/215 kB | 37 kB&#xD;Progress (2): 192/215 kB | 37 kB&#xD;Progress (2): 196/215 kB | 37 kB&#xD;Progress (2): 200/215 kB | 37 kB&#xD;Progress (2): 204/215 kB | 37 kB&#xD;Progress (2): 208/215 kB | 37 kB&#xD;Progress (2): 213/215 kB | 37 kB&#xD;Progress (2): 215 kB | 37 kB    &#xD;Progress (3): 215 kB | 37 kB | 4.1/134 kB&#xD;Progress (3): 215 kB | 37 kB | 7.7/134 kB&#xD;Progress (3): 215 kB | 37 kB | 12/134 kB &#xD;Progress (3): 215 kB | 37 kB | 16/134 kB&#xD;Progress (3): 215 kB | 37 kB | 20/134 kB&#xD;Progress (3): 215 kB | 37 kB | 24/134 kB&#xD;Progress (3): 215 kB | 37 kB | 28/134 kB&#xD;Progress (3): 215 kB | 37 kB | 32/134 kB&#xD;Progress (3): 215 kB | 37 kB | 36/134 kB&#xD;Progress (3): 215 kB | 37 kB | 40/134 kB&#xD;Progress (3): 215 kB | 37 kB | 45/134 kB&#xD;Progress (3): 215 kB | 37 kB | 49/134 kB&#xD;Progress (3): 215 kB | 37 kB | 53/134 kB&#xD;Progress (3): 215 kB | 37 kB | 57/134 kB&#xD;Progress (3): 215 kB | 37 kB | 61/134 kB&#xD;Progress (3): 215 kB | 37 kB | 65/134 kB&#xD;Progress (3): 215 kB | 37 kB | 69/134 kB&#xD;Progress (3): 215 kB | 37 kB | 73/134 kB&#xD;Progress (3): 215 kB | 37 kB | 77/134 kB&#xD;Progress (3): 215 kB | 37 kB | 81/134 kB&#xD;Progress (3): 215 kB | 37 kB | 86/134 kB&#xD;Progress (3): 215 kB | 37 kB | 90/134 kB&#xD;Progress (3): 215 kB | 37 kB | 94/134 kB&#xD;Progress (3): 215 kB | 37 kB | 98/134 kB&#xD;Progress (3): 215 kB | 37 kB | 102/134 kB&#xD;Progress (3): 215 kB | 37 kB | 106/134 kB&#xD;Progress (3): 215 kB | 37 kB | 110/134 kB&#xD;Progress (3): 215 kB | 37 kB | 114/134 kB&#xD;Progress (3): 215 kB | 37 kB | 118/134 kB&#xD;Progress (3): 215 kB | 37 kB | 122/134 kB&#xD;Progress (3): 215 kB | 37 kB | 126/134 kB&#xD;Progress (3): 215 kB | 37 kB | 131/134 kB&#xD;Progress (3): 215 kB | 37 kB | 134 kB    &#xD;Progress (4): 215 kB | 37 kB | 134 kB | 3.4/180 kB&#xD;Progress (4): 215 kB | 37 kB | 134 kB | 7.5/180 kB&#xD;Progress (4): 215 kB | 37 kB | 134 kB | 12/180 kB &#xD;Progress (4): 215 kB | 37 kB | 134 kB | 16/180 kB&#xD;Progress (4): 215 kB | 37 kB | 134 kB | 20/180 kB&#xD;Progress (4): 215 kB | 37 kB | 134 kB | 24/180 kB&#xD;Progress (4): 215 kB | 37 kB | 134 kB | 28/180 kB&#xD;Progress (4): 215 kB | 37 kB | 134 kB | 32/180 kB&#xD;Progress (4): 215 kB | 37 kB | 134 kB | 36/180 kB&#xD;Progress (4): 215 kB | 37 kB | 134 kB | 40/180 kB&#xD;Progress (4): 215 kB | 37 kB | 134 kB | 44/180 kB&#xD;Progress (4): 215 kB | 37 kB | 134 kB | 48/180 kB&#xD;Progress (4): 215 kB | 37 kB | 134 kB | 53/180 kB&#xD;Progress (4): 215 kB | 37 kB | 134 kB | 57/180 kB&#xD;                                                 &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/maven/shared/maven-dependency-tree/3.0.1/maven-dependency-tree-3.0.1.jar (37 kB at 129 kB/s)&#xA;Progress (3): 215 kB | 134 kB | 61/180 kB&#xD;                                         &#xD;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/guava/28.2-android/guava-28.2-android.jar&#xA;Progress (3): 215 kB | 134 kB | 65/180 kB&#xD;Progress (3): 215 kB | 134 kB | 69/180 kB&#xD;Progress (3): 215 kB | 134 kB | 73/180 kB&#xD;Progress (3): 215 kB | 134 kB | 77/180 kB&#xD;Progress (3): 215 kB | 134 kB | 81/180 kB&#xD;Progress (3): 215 kB | 134 kB | 85/180 kB&#xD;Progress (3): 215 kB | 134 kB | 89/180 kB&#xD;Progress (3): 215 kB | 134 kB | 93/180 kB&#xD;Progress (3): 215 kB | 134 kB | 98/180 kB&#xD;Progress (3): 215 kB | 134 kB | 102/180 kB&#xD;Progress (3): 215 kB | 134 kB | 106/180 kB&#xD;Progress (3): 215 kB | 134 kB | 110/180 kB&#xD;Progress (3): 215 kB | 134 kB | 114/180 kB&#xD;Progress (3): 215 kB | 134 kB | 118/180 kB&#xD;Progress (3): 215 kB | 134 kB | 122/180 kB&#xD;Progress (3): 215 kB | 134 kB | 126/180 kB&#xD;Progress (3): 215 kB | 134 kB | 130/180 kB&#xD;Progress (3): 215 kB | 134 kB | 134/180 kB&#xD;Progress (3): 215 kB | 134 kB | 139/180 kB&#xD;Progress (3): 215 kB | 134 kB | 143/180 kB&#xD;Progress (3): 215 kB | 134 kB | 147/180 kB&#xD;Progress (3): 215 kB | 134 kB | 151/180 kB&#xD;Progress (3): 215 kB | 134 kB | 155/180 kB&#xD;Progress (3): 215 kB | 134 kB | 159/180 kB&#xD;Progress (3): 215 kB | 134 kB | 163/180 kB&#xD;Progress (3): 215 kB | 134 kB | 167/180 kB&#xD;Progress (3): 215 kB | 134 kB | 171/180 kB&#xD;Progress (3): 215 kB | 134 kB | 175/180 kB&#xD;Progress (3): 215 kB | 134 kB | 179/180 kB&#xD;Progress (3): 215 kB | 134 kB | 180 kB    &#xD;                                      &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/commons-io/commons-io/2.6/commons-io-2.6.jar (215 kB at 748 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/failureaccess/1.0.1/failureaccess-1.0.1.jar&#xA;Progress (3): 134 kB | 180 kB | 4.1/85 kB&#xD;Progress (3): 134 kB | 180 kB | 7.7/85 kB&#xD;Progress (3): 134 kB | 180 kB | 12/85 kB &#xD;Progress (3): 134 kB | 180 kB | 16/85 kB&#xD;Progress (3): 134 kB | 180 kB | 20/85 kB&#xD;Progress (3): 134 kB | 180 kB | 24/85 kB&#xD;Progress (3): 134 kB | 180 kB | 28/85 kB&#xD;Progress (3): 134 kB | 180 kB | 32/85 kB&#xD;Progress (3): 134 kB | 180 kB | 36/85 kB&#xD;Progress (3): 134 kB | 180 kB | 40/85 kB&#xD;Progress (3): 134 kB | 180 kB | 44/85 kB&#xD;Progress (3): 134 kB | 180 kB | 48/85 kB&#xD;Progress (3): 134 kB | 180 kB | 53/85 kB&#xD;Progress (3): 134 kB | 180 kB | 57/85 kB&#xD;Progress (3): 134 kB | 180 kB | 61/85 kB&#xD;Progress (3): 134 kB | 180 kB | 65/85 kB&#xD;Progress (3): 134 kB | 180 kB | 69/85 kB&#xD;Progress (3): 134 kB | 180 kB | 73/85 kB&#xD;Progress (3): 134 kB | 180 kB | 77/85 kB&#xD;Progress (3): 134 kB | 180 kB | 81/85 kB&#xD;Progress (3): 134 kB | 180 kB | 85 kB   &#xD;                                     &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/eclipse/aether/aether-util/0.9.0.M2/aether-util-0.9.0.M2.jar (134 kB at 453 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/guava/listenablefuture/9999.0-empty-to-avoid-conflict-with-guava/listenablefuture-9999.0-empty-to-avoid-conflict-with-guava.jar&#xA;Progress (3): 180 kB | 85 kB | 3.3/4.6 kB&#xD;Progress (3): 180 kB | 85 kB | 4.6 kB    &#xD;Progress (4): 180 kB | 85 kB | 4.6 kB | 0/2.6 MB&#xD;Progress (4): 180 kB | 85 kB | 4.6 kB | 0/2.6 MB&#xD;Progress (4): 180 kB | 85 kB | 4.6 kB | 0/2.6 MB&#xD;Progress (4): 180 kB | 85 kB | 4.6 kB | 0.1/2.6 MB&#xD;Progress (4): 180 kB | 85 kB | 4.6 kB | 0.1/2.6 MB&#xD;Progress (4): 180 kB | 85 kB | 4.6 kB | 0.1/2.6 MB&#xD;Progress (4): 180 kB | 85 kB | 4.6 kB | 0.1/2.6 MB&#xD;Progress (4): 180 kB | 85 kB | 4.6 kB | 0.1/2.6 MB&#xD;Progress (4): 180 kB | 85 kB | 4.6 kB | 0.1/2.6 MB&#xD;                                                  &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/vafer/jdependency/2.4.0/jdependency-2.4.0.jar (180 kB at 581 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/3.0.2/jsr305-3.0.2.jar&#xA;Progress (3): 85 kB | 4.6 kB | 0.2/2.6 MB&#xD;Progress (3): 85 kB | 4.6 kB | 0.2/2.6 MB&#xD;Progress (3): 85 kB | 4.6 kB | 0.2/2.6 MB&#xD;Progress (3): 85 kB | 4.6 kB | 0.2/2.6 MB&#xD;Progress (3): 85 kB | 4.6 kB | 0.2/2.6 MB&#xD;Progress (3): 85 kB | 4.6 kB | 0.2/2.6 MB&#xD;Progress (3): 85 kB | 4.6 kB | 0.3/2.6 MB&#xD;Progress (3): 85 kB | 4.6 kB | 0.3/2.6 MB&#xD;Progress (3): 85 kB | 4.6 kB | 0.3/2.6 MB&#xD;Progress (3): 85 kB | 4.6 kB | 0.3/2.6 MB&#xD;Progress (3): 85 kB | 4.6 kB | 0.3/2.6 MB&#xD;Progress (3): 85 kB | 4.6 kB | 0.3/2.6 MB&#xD;Progress (3): 85 kB | 4.6 kB | 0.4/2.6 MB&#xD;Progress (4): 85 kB | 4.6 kB | 0.4/2.6 MB | 2.2 kB&#xD;                                                  &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/ow2/asm/asm-util/8.0/asm-util-8.0.jar (85 kB at 270 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/checkerframework/checker-compat-qual/2.5.5/checker-compat-qual-2.5.5.jar&#xA;Progress (3): 4.6 kB | 0.4/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.4/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.4/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.4/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.4/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.5/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.5/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.5/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.5/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.5/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.5/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.6/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.6/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.6/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.6/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.6/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.6/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.7/2.6 MB | 2.2 kB&#xD;Progress (3): 4.6 kB | 0.7/2.6 MB | 2.2 kB&#xD;                                          &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/failureaccess/1.0.1/failureaccess-1.0.1.jar (4.6 kB at 14 kB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_annotations/2.3.4/error_prone_annotations-2.3.4.jar&#xA;Progress (2): 0.7/2.6 MB | 2.2 kB&#xD;Progress (2): 0.7/2.6 MB | 2.2 kB&#xD;Progress (2): 0.7/2.6 MB | 2.2 kB&#xD;Progress (2): 0.7/2.6 MB | 2.2 kB&#xD;Progress (2): 0.8/2.6 MB | 2.2 kB&#xD;Progress (2): 0.8/2.6 MB | 2.2 kB&#xD;Progress (2): 0.8/2.6 MB | 2.2 kB&#xD;Progress (2): 0.8/2.6 MB | 2.2 kB&#xD;Progress (2): 0.8/2.6 MB | 2.2 kB&#xD;Progress (2): 0.8/2.6 MB | 2.2 kB&#xD;Progress (2): 0.8/2.6 MB | 2.2 kB&#xD;Progress (2): 0.9/2.6 MB | 2.2 kB&#xD;Progress (2): 0.9/2.6 MB | 2.2 kB&#xD;Progress (2): 0.9/2.6 MB | 2.2 kB&#xD;Progress (2): 0.9/2.6 MB | 2.2 kB&#xD;Progress (2): 0.9/2.6 MB | 2.2 kB&#xD;Progress (2): 0.9/2.6 MB | 2.2 kB&#xD;Progress (2): 1.0/2.6 MB | 2.2 kB&#xD;Progress (2): 1.0/2.6 MB | 2.2 kB&#xD;Progress (2): 1.0/2.6 MB | 2.2 kB&#xD;Progress (2): 1.0/2.6 MB | 2.2 kB&#xD;Progress (2): 1.0/2.6 MB | 2.2 kB&#xD;Progress (2): 1.0/2.6 MB | 2.2 kB&#xD;Progress (2): 1.1/2.6 MB | 2.2 kB&#xD;Progress (2): 1.1/2.6 MB | 2.2 kB&#xD;Progress (2): 1.1/2.6 MB | 2.2 kB&#xD;Progress (2): 1.1/2.6 MB | 2.2 kB&#xD;Progress (2): 1.1/2.6 MB | 2.2 kB&#xD;Progress (2): 1.1/2.6 MB | 2.2 kB&#xD;Progress (2): 1.2/2.6 MB | 2.2 kB&#xD;Progress (2): 1.2/2.6 MB | 2.2 kB&#xD;Progress (2): 1.2/2.6 MB | 2.2 kB&#xD;Progress (2): 1.2/2.6 MB | 2.2 kB&#xD;Progress (2): 1.2/2.6 MB | 2.2 kB&#xD;Progress (2): 1.2/2.6 MB | 2.2 kB&#xD;Progress (2): 1.3/2.6 MB | 2.2 kB&#xD;Progress (2): 1.3/2.6 MB | 2.2 kB&#xD;Progress (2): 1.3/2.6 MB | 2.2 kB&#xD;Progress (2): 1.3/2.6 MB | 2.2 kB&#xD;Progress (2): 1.3/2.6 MB | 2.2 kB&#xD;Progress (2): 1.3/2.6 MB | 2.2 kB&#xD;Progress (2): 1.4/2.6 MB | 2.2 kB&#xD;Progress (2): 1.4/2.6 MB | 2.2 kB&#xD;Progress (2): 1.4/2.6 MB | 2.2 kB&#xD;Progress (2): 1.4/2.6 MB | 2.2 kB&#xD;Progress (2): 1.4/2.6 MB | 2.2 kB&#xD;Progress (2): 1.4/2.6 MB | 2.2 kB&#xD;Progress (2): 1.5/2.6 MB | 2.2 kB&#xD;Progress (2): 1.5/2.6 MB | 2.2 kB&#xD;Progress (2): 1.5/2.6 MB | 2.2 kB&#xD;Progress (2): 1.5/2.6 MB | 2.2 kB&#xD;Progress (2): 1.5/2.6 MB | 2.2 kB&#xD;Progress (2): 1.5/2.6 MB | 2.2 kB&#xD;Progress (2): 1.6/2.6 MB | 2.2 kB&#xD;Progress (2): 1.6/2.6 MB | 2.2 kB&#xD;Progress (2): 1.6/2.6 MB | 2.2 kB&#xD;Progress (2): 1.6/2.6 MB | 2.2 kB&#xD;Progress (2): 1.6/2.6 MB | 2.2 kB&#xD;Progress (2): 1.6/2.6 MB | 2.2 kB&#xD;Progress (2): 1.7/2.6 MB | 2.2 kB&#xD;Progress (2): 1.7/2.6 MB | 2.2 kB&#xD;Progress (2): 1.7/2.6 MB | 2.2 kB&#xD;Progress (2): 1.7/2.6 MB | 2.2 kB&#xD;Progress (2): 1.7/2.6 MB | 2.2 kB&#xD;Progress (2): 1.7/2.6 MB | 2.2 kB&#xD;Progress (2): 1.8/2.6 MB | 2.2 kB&#xD;Progress (2): 1.8/2.6 MB | 2.2 kB&#xD;Progress (2): 1.8/2.6 MB | 2.2 kB&#xD;Progress (2): 1.8/2.6 MB | 2.2 kB&#xD;Progress (3): 1.8/2.6 MB | 2.2 kB | 4.1/20 kB&#xD;Progress (3): 1.8/2.6 MB | 2.2 kB | 4.1/20 kB&#xD;Progress (3): 1.8/2.6 MB | 2.2 kB | 7.7/20 kB&#xD;Progress (3): 1.8/2.6 MB | 2.2 kB | 7.7/20 kB&#xD;Progress (3): 1.8/2.6 MB | 2.2 kB | 12/20 kB &#xD;Progress (3): 1.8/2.6 MB | 2.2 kB | 16/20 kB&#xD;Progress (3): 1.8/2.6 MB | 2.2 kB | 16/20 kB&#xD;Progress (3): 1.8/2.6 MB | 2.2 kB | 20 kB   &#xD;Progress (3): 1.9/2.6 MB | 2.2 kB | 20 kB&#xD;Progress (3): 1.9/2.6 MB | 2.2 kB | 20 kB&#xD;Progress (3): 1.9/2.6 MB | 2.2 kB | 20 kB&#xD;Progress (3): 1.9/2.6 MB | 2.2 kB | 20 kB&#xD;                                         &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/listenablefuture/9999.0-empty-to-avoid-conflict-with-guava/listenablefuture-9999.0-empty-to-avoid-conflict-with-guava.jar (2.2 kB at 6.6 kB/s)&#xA;Progress (2): 1.9/2.6 MB | 20 kB&#xD;                                &#xD;Downloading from central: https://repo.maven.apache.org/maven2/com/google/j2objc/j2objc-annotations/1.3/j2objc-annotations-1.3.jar&#xA;Progress (2): 1.9/2.6 MB | 20 kB&#xD;Progress (2): 2.0/2.6 MB | 20 kB&#xD;Progress (2): 2.0/2.6 MB | 20 kB&#xD;Progress (2): 2.0/2.6 MB | 20 kB&#xD;Progress (2): 2.0/2.6 MB | 20 kB&#xD;Progress (2): 2.0/2.6 MB | 20 kB&#xD;Progress (2): 2.0/2.6 MB | 20 kB&#xD;Progress (2): 2.1/2.6 MB | 20 kB&#xD;Progress (2): 2.1/2.6 MB | 20 kB&#xD;Progress (2): 2.1/2.6 MB | 20 kB&#xD;Progress (2): 2.1/2.6 MB | 20 kB&#xD;Progress (2): 2.1/2.6 MB | 20 kB&#xD;Progress (2): 2.1/2.6 MB | 20 kB&#xD;Progress (2): 2.2/2.6 MB | 20 kB&#xD;Progress (2): 2.2/2.6 MB | 20 kB&#xD;Progress (2): 2.2/2.6 MB | 20 kB&#xD;Progress (2): 2.2/2.6 MB | 20 kB&#xD;Progress (2): 2.2/2.6 MB | 20 kB&#xD;Progress (2): 2.2/2.6 MB | 20 kB&#xD;Progress (2): 2.3/2.6 MB | 20 kB&#xD;Progress (2): 2.3/2.6 MB | 20 kB&#xD;Progress (2): 2.3/2.6 MB | 20 kB&#xD;Progress (2): 2.3/2.6 MB | 20 kB&#xD;Progress (2): 2.3/2.6 MB | 20 kB&#xD;Progress (2): 2.3/2.6 MB | 20 kB&#xD;Progress (2): 2.4/2.6 MB | 20 kB&#xD;Progress (2): 2.4/2.6 MB | 20 kB&#xD;Progress (2): 2.4/2.6 MB | 20 kB&#xD;Progress (2): 2.4/2.6 MB | 20 kB&#xD;Progress (2): 2.4/2.6 MB | 20 kB&#xD;Progress (2): 2.4/2.6 MB | 20 kB&#xD;Progress (2): 2.5/2.6 MB | 20 kB&#xD;Progress (3): 2.5/2.6 MB | 20 kB | 4.1/14 kB&#xD;Progress (3): 2.5/2.6 MB | 20 kB | 4.1/14 kB&#xD;Progress (3): 2.5/2.6 MB | 20 kB | 7.7/14 kB&#xD;Progress (3): 2.5/2.6 MB | 20 kB | 12/14 kB &#xD;Progress (3): 2.5/2.6 MB | 20 kB | 14 kB   &#xD;Progress (4): 2.5/2.6 MB | 20 kB | 14 kB | 4.1/5.9 kB&#xD;Progress (4): 2.5/2.6 MB | 20 kB | 14 kB | 4.1/5.9 kB&#xD;Progress (4): 2.5/2.6 MB | 20 kB | 14 kB | 5.9 kB    &#xD;Progress (4): 2.5/2.6 MB | 20 kB | 14 kB | 5.9 kB&#xD;Progress (4): 2.5/2.6 MB | 20 kB | 14 kB | 5.9 kB&#xD;Progress (4): 2.5/2.6 MB | 20 kB | 14 kB | 5.9 kB&#xD;Progress (4): 2.6/2.6 MB | 20 kB | 14 kB | 5.9 kB&#xD;Progress (4): 2.6/2.6 MB | 20 kB | 14 kB | 5.9 kB&#xD;Progress (4): 2.6/2.6 MB | 20 kB | 14 kB | 5.9 kB&#xD;Progress (4): 2.6/2.6 MB | 20 kB | 14 kB | 5.9 kB&#xD;Progress (4): 2.6/2.6 MB | 20 kB | 14 kB | 5.9 kB&#xD;Progress (4): 2.6 MB | 20 kB | 14 kB | 5.9 kB    &#xD;Progress (5): 2.6 MB | 20 kB | 14 kB | 5.9 kB | 4.1/8.8 kB&#xD;Progress (5): 2.6 MB | 20 kB | 14 kB | 5.9 kB | 7.7/8.8 kB&#xD;Progress (5): 2.6 MB | 20 kB | 14 kB | 5.9 kB | 8.8 kB    &#xD;                                                      &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/guava/guava/28.2-android/guava-28.2-android.jar (2.6 MB at 7.4 MB/s)&#xA;Downloading from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.7/commons-lang3-3.7.jar&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/code/findbugs/jsr305/3.0.2/jsr305-3.0.2.jar (20 kB at 56 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/org/checkerframework/checker-compat-qual/2.5.5/checker-compat-qual-2.5.5.jar (5.9 kB at 16 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/j2objc/j2objc-annotations/1.3/j2objc-annotations-1.3.jar (8.8 kB at 24 kB/s)&#xA;Downloaded from central: https://repo.maven.apache.org/maven2/com/google/errorprone/error_prone_annotations/2.3.4/error_prone_annotations-2.3.4.jar (14 kB at 38 kB/s)&#xA;Progress (1): 4.1/500 kB&#xD;Progress (1): 7.7/500 kB&#xD;Progress (1): 12/500 kB &#xD;Progress (1): 16/500 kB&#xD;Progress (1): 20/500 kB&#xD;Progress (1): 24/500 kB&#xD;Progress (1): 28/500 kB&#xD;Progress (1): 32/500 kB&#xD;Progress (1): 36/500 kB&#xD;Progress (1): 40/500 kB&#xD;Progress (1): 44/500 kB&#xD;Progress (1): 48/500 kB&#xD;Progress (1): 53/500 kB&#xD;Progress (1): 57/500 kB&#xD;Progress (1): 61/500 kB&#xD;Progress (1): 65/500 kB&#xD;Progress (1): 69/500 kB&#xD;Progress (1): 73/500 kB&#xD;Progress (1): 77/500 kB&#xD;Progress (1): 81/500 kB&#xD;Progress (1): 85/500 kB&#xD;Progress (1): 89/500 kB&#xD;Progress (1): 93/500 kB&#xD;Progress (1): 98/500 kB&#xD;Progress (1): 102/500 kB&#xD;Progress (1): 106/500 kB&#xD;Progress (1): 110/500 kB&#xD;Progress (1): 114/500 kB&#xD;Progress (1): 118/500 kB&#xD;Progress (1): 122/500 kB&#xD;Progress (1): 126/500 kB&#xD;Progress (1): 130/500 kB&#xD;Progress (1): 134/500 kB&#xD;Progress (1): 139/500 kB&#xD;Progress (1): 143/500 kB&#xD;Progress (1): 147/500 kB&#xD;Progress (1): 151/500 kB&#xD;Progress (1): 155/500 kB&#xD;Progress (1): 159/500 kB&#xD;Progress (1): 163/500 kB&#xD;Progress (1): 167/500 kB&#xD;Progress (1): 171/500 kB&#xD;Progress (1): 175/500 kB&#xD;Progress (1): 179/500 kB&#xD;Progress (1): 184/500 kB&#xD;Progress (1): 188/500 kB&#xD;Progress (1): 192/500 kB&#xD;Progress (1): 196/500 kB&#xD;Progress (1): 200/500 kB&#xD;Progress (1): 204/500 kB&#xD;Progress (1): 208/500 kB&#xD;Progress (1): 212/500 kB&#xD;Progress (1): 216/500 kB&#xD;Progress (1): 220/500 kB&#xD;Progress (1): 225/500 kB&#xD;Progress (1): 229/500 kB&#xD;Progress (1): 233/500 kB&#xD;Progress (1): 237/500 kB&#xD;Progress (1): 241/500 kB&#xD;Progress (1): 245/500 kB&#xD;Progress (1): 249/500 kB&#xD;Progress (1): 253/500 kB&#xD;Progress (1): 257/500 kB&#xD;Progress (1): 261/500 kB&#xD;Progress (1): 265/500 kB&#xD;Progress (1): 270/500 kB&#xD;Progress (1): 274/500 kB&#xD;Progress (1): 278/500 kB&#xD;Progress (1): 282/500 kB&#xD;Progress (1): 286/500 kB&#xD;Progress (1): 290/500 kB&#xD;Progress (1): 294/500 kB&#xD;Progress (1): 298/500 kB&#xD;Progress (1): 302/500 kB&#xD;Progress (1): 306/500 kB&#xD;Progress (1): 311/500 kB&#xD;Progress (1): 315/500 kB&#xD;Progress (1): 319/500 kB&#xD;Progress (1): 323/500 kB&#xD;Progress (1): 327/500 kB&#xD;Progress (1): 331/500 kB&#xD;Progress (1): 335/500 kB&#xD;Progress (1): 339/500 kB&#xD;Progress (1): 343/500 kB&#xD;Progress (1): 347/500 kB&#xD;Progress (1): 352/500 kB&#xD;Progress (1): 356/500 kB&#xD;Progress (1): 360/500 kB&#xD;Progress (1): 364/500 kB&#xD;Progress (1): 368/500 kB&#xD;Progress (1): 372/500 kB&#xD;Progress (1): 376/500 kB&#xD;Progress (1): 380/500 kB&#xD;Progress (1): 384/500 kB&#xD;Progress (1): 388/500 kB&#xD;Progress (1): 392/500 kB&#xD;Progress (1): 397/500 kB&#xD;Progress (1): 401/500 kB&#xD;Progress (1): 405/500 kB&#xD;Progress (1): 409/500 kB&#xD;Progress (1): 413/500 kB&#xD;Progress (1): 417/500 kB&#xD;Progress (1): 421/500 kB&#xD;Progress (1): 425/500 kB&#xD;Progress (1): 429/500 kB&#xD;Progress (1): 433/500 kB&#xD;Progress (1): 438/500 kB&#xD;Progress (1): 442/500 kB&#xD;Progress (1): 446/500 kB&#xD;Progress (1): 450/500 kB&#xD;Progress (1): 454/500 kB&#xD;Progress (1): 458/500 kB&#xD;Progress (1): 462/500 kB&#xD;Progress (1): 466/500 kB&#xD;Progress (1): 470/500 kB&#xD;Progress (1): 474/500 kB&#xD;Progress (1): 478/500 kB&#xD;Progress (1): 483/500 kB&#xD;Progress (1): 487/500 kB&#xD;Progress (1): 491/500 kB&#xD;Progress (1): 495/500 kB&#xD;Progress (1): 499/500 kB&#xD;Progress (1): 500 kB    &#xD;                    &#xD;Downloaded from central: https://repo.maven.apache.org/maven2/org/apache/commons/commons-lang3/3.7/commons-lang3-3.7.jar (500 kB at 1.3 MB/s)&#xA;[INFO] Including io.github.stuartwdouglas.hacbs-test.simple:simple-jdk17:jar:0.1.2 in the shaded jar.&#xA;[INFO] Including io.github.stuartwdouglas.hacbs-test.shaded:shaded-jdk11:jar:1.9 in the shaded jar.&#xA;[INFO] Including io.github.stuartwdouglas.hacbs-test.simple:simple-jdk8:jar:1.2.4 in the shaded jar.&#xA;[INFO] Including io.github.stuartwdouglas.hacbs-test.gradle:hacbs-test-simple-gradle-jdk8:jar:1.1 in the shaded jar.&#xA;[WARNING] hacbs-test-simple-gradle-jdk8-1.1.jar, hacbs-test.jar, shaded-jdk11-1.9.jar, simple-jdk17-0.1.2.jar, simple-jdk8-1.2.4.jar define 1 overlapping resource: &#xA;[WARNING]   - META-INF/MANIFEST.MF&#xA;[WARNING] shaded-jdk11-1.9.jar, simple-jdk8-1.2.4.jar define 3 overlapping classes and resources: &#xA;[WARNING]   - META-INF/maven/io.github.stuartwdouglas.hacbs-test.simple/simple-jdk8/pom.properties&#xA;[WARNING]   - META-INF/maven/io.github.stuartwdouglas.hacbs-test.simple/simple-jdk8/pom.xml&#xA;[WARNING]   - io.github.stuartwdouglas.hacbstest.simple.simplejdk8.Placeholder&#xA;[WARNING] maven-shade-plugin has detected that some class files are&#xA;[WARNING] present in two or more JARs. When this happens, only one&#xA;[WARNING] single version of the class is copied to the uber jar.&#xA;[WARNING] Usually this is not harmful and you can skip these warnings,&#xA;[WARNING] otherwise try to manually exclude artifacts based on&#xA;[WARNING] mvn dependency:tree -Ddetail=true and the above output.&#xA;[WARNING] See http://maven.apache.org/plugins/maven-shade-plugin/&#xA;[INFO] Replacing original artifact with shaded artifact.&#xA;[INFO] Replacing /work/target/hacbs-test.jar with /work/target/simple-java-project-1.0-SNAPSHOT-shaded.jar&#xA;[INFO] ------------------------------------------------------------------------&#xA;[INFO] BUILD SUCCESS&#xA;[INFO] ------------------------------------------------------------------------&#xA;[INFO] Total time:  23.419 s&#xA;[INFO] Finished at: 2026-04-19T13:54:52Z&#xA;[INFO] ------------------------------------------------------------------------&#xA;[2/2] STEP 1/10: FROM registry.access.redhat.com/ubi8/openjdk-17-runtime:1.23&#xA;[2/2] STEP 2/10: USER 185&#xA;[2/2] STEP 3/10: WORKDIR /work/&#xA;[2/2] STEP 4/10: COPY --from=builder /work/target/hacbs-test.jar /deployments&#xA;[2/2] STEP 5/10: EXPOSE 8081&#xA;[2/2] STEP 6/10: ENV AB_JOLOKIA_OFF=&#34;&#34;&#xA;[2/2] STEP 7/10: ENV JAVA_APP_JAR=&#34;/deployments/hacbs-test.jar&#34;&#xA;[2/2] STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json&#xA;[2/2] STEP 9/10: COPY labels.json /root/buildinfo/labels.json&#xA;[2/2] STEP 10/10: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;1dc6580ea2177581106ef7a7bc3a5373b5412958&#34; &#34;org.opencontainers.image.revision&#34;=&#34;1dc6580ea2177581106ef7a7bc3a5373b5412958&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo&#34; &#34;build-date&#34;=&#34;2026-04-19T13:54:02Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-04-19T13:54:02Z&#34;&#xA;[2/2] COMMIT quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#xA;--&gt; 477faa991965&#xA;Successfully tagged quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#xA;477faa9919655f645592ba9c127d3c87b3f7a6c272cbdcb63f0593da7cb8f054&#xA;[2026-04-19T13:54:54,142232024+00:00] Unsetting proxy&#xA;[2026-04-19T13:54:54,143457076+00:00] Add metadata&#xA;Recording base image digests used&#xA;registry.access.redhat.com/ubi8/openjdk-17:1.23 registry.access.redhat.com/ubi8/openjdk-17:1.23@sha256:6e6e98401043d71da4c926b39f81212e3706b217cafc4486a021d8fd70942a2c&#xA;registry.access.redhat.com/ubi8/openjdk-17-runtime:1.23 registry.access.redhat.com/ubi8/openjdk-17-runtime:1.23@sha256:16c9eb408282e44fa73ca965e1c17985a918e547e3e93ab361377b26358ac998&#xA;Getting image source signatures&#xA;Copying blob sha256:d02ad0be35fee22b3f64a3fd06d0c2706975b6cebff156e618d8a733b6b65bb1&#xA;Copying blob sha256:731ab6a4578231c25989402ed2e317a416e5cc5470b94e3bd903ded3688705ac&#xA;Copying blob sha256:90168dace6ac682b637f792ee2ace5eb28ab551affc91d45ba799bcd18295421&#xA;Copying config sha256:477faa9919655f645592ba9c127d3c87b3f7a6c272cbdcb63f0593da7cb8f054&#xA;Writing manifest to image destination&#xA;[2026-04-19T13:54:57,984778645+00:00] End build&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-build-container-pod | container step-push: &#xA;[2026-04-19T13:54:58,501389250+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-04-19T13:55:01,300482805+00:00] Convert image&#xA;[2026-04-19T13:55:01,301827995+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:konflux-demo-component-kcal-on-push-f7qsx-build-container&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958 docker://quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:konflux-demo-component-kcal-on-push-f7qsx-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:d02ad0be35fee22b3f64a3fd06d0c2706975b6cebff156e618d8a733b6b65bb1&#xA;Copying blob sha256:90168dace6ac682b637f792ee2ace5eb28ab551affc91d45ba799bcd18295421&#xA;Copying blob sha256:731ab6a4578231c25989402ed2e317a416e5cc5470b94e3bd903ded3688705ac&#xA;Copying config sha256:477faa9919655f645592ba9c127d3c87b3f7a6c272cbdcb63f0593da7cb8f054&#xA;Writing manifest to image destination&#xA;[2026-04-19T13:55:40,688284852+00:00] Push image with git revision&#xA;Pushing to quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958 docker://quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#xA;Getting image source signatures&#xA;Copying blob sha256:d02ad0be35fee22b3f64a3fd06d0c2706975b6cebff156e618d8a733b6b65bb1&#xA;Copying blob sha256:90168dace6ac682b637f792ee2ace5eb28ab551affc91d45ba799bcd18295421&#xA;Copying blob sha256:731ab6a4578231c25989402ed2e317a416e5cc5470b94e3bd903ded3688705ac&#xA;Copying config sha256:477faa9919655f645592ba9c127d3c87b3f7a6c272cbdcb63f0593da7cb8f054&#xA;Writing manifest to image destination&#xA;sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#xA;[retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;[2026-04-19T13:55:42,210844289+00:00] End push&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-build-container-pod | container step-sbom-syft-generate: &#xA;[2026-04-19T13:55:42,690440668+00:00] Generate SBOM&#xA;Running syft on the image&#xA;Running syft on the source code&#xA;[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;[2026-04-19T13:55:51,615207442+00:00] End sbom-syft-generate&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-build-container-pod | container step-prepare-sboms: &#xA;[2026-04-19T13:55:51,859565556+00:00] Prepare SBOM&#xA;[2026-04-19T13:55:51,863445029+00:00] Generate SBOM with mobster&#xA;Skipping SBOM validation&#xA;2026-04-19 13:55:53,052 [INFO] mobster.log: Logging level set to 20&#xA;2026-04-19 13:55:53,142 [INFO] mobster.oci: Fetching manifest for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:16c9eb408282e44fa73ca965e1c17985a918e547e3e93ab361377b26358ac998&#xA;2026-04-19 13:55:53,705 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:83d4edae6b3967e539ef4ec566e3bb865a84506a6a1fe7e4770320da72e56dbb with output b&#34;Error: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\nerror during command execution: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\n&#34;&#xA;2026-04-19 13:55:53,971 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:83d4edae6b3967e539ef4ec566e3bb865a84506a6a1fe7e4770320da72e56dbb with output b&#34;Error: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\nerror during command execution: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\n&#34;&#xA;2026-04-19 13:55:54,350 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:83d4edae6b3967e539ef4ec566e3bb865a84506a6a1fe7e4770320da72e56dbb with output b&#34;Error: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\nerror during command execution: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\n&#34;&#xA;2026-04-19 13:55:54,660 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:83d4edae6b3967e539ef4ec566e3bb865a84506a6a1fe7e4770320da72e56dbb with output b&#34;Error: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\nerror during command execution: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\n&#34;&#xA;2026-04-19 13:55:55,165 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:83d4edae6b3967e539ef4ec566e3bb865a84506a6a1fe7e4770320da72e56dbb with output b&#34;Error: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\nerror during command execution: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\n&#34;&#xA;2026-04-19 13:55:55,450 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:83d4edae6b3967e539ef4ec566e3bb865a84506a6a1fe7e4770320da72e56dbb with output b&#34;Error: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\nerror during command execution: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\n&#34;&#xA;2026-04-19 13:55:55,997 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:83d4edae6b3967e539ef4ec566e3bb865a84506a6a1fe7e4770320da72e56dbb with output b&#34;Error: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\nerror during command execution: no attestations with predicate type &#39;https://spdx.dev/Document&#39; found\n&#34;&#xA;2026-04-19 13:55:56,207 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi8/openjdk-17-runtime@sha256:83d4edae6b3967e539ef4ec566e3bb865a84506a6a1fe7e4770320da72e56dbb with output b&#34;Error: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\nerror during command execution: no attestations with predicate type &#39;https://cyclonedx.org/bom&#39; found\n&#34;&#xA;2026-04-19 13:55:56,208 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;2026-04-19 13:55:56,208 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;2026-04-19 13:55:56,208 [INFO] mobster.log: Contextual workflow completed in 3.09s&#xA;2026-04-19 13:55:56,247 [INFO] mobster.main: Exiting with code 0.&#xA;[2026-04-19T13:55:56,324614682+00:00] End prepare-sboms&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-build-container-pod | container step-upload-sbom: &#xA;[2026-04-19T13:55:57,004817623+00:00] Upload SBOM&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using token for quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal&#xA;Pushing sbom to registry&#xA;[retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958@sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625&#xA;WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;Uploading SBOM file for [quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625] to [quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:sha256-f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625.sbom] with mediaType [text/spdx+json].&#xA;&#xA;quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:06d1af9e3437b2f14c56ff431813a7abbe37521bb9782c294d310318c45717c7&#xA;[2026-04-19T13:56:00,815730849+00:00] End upload-sbom&#xA;&#xA; pod: konflux-demo-component-kcal-on-push-f7qsx-build-image-index-pod | init container: prepare&#xA;2026/04/19 13:56:11 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-kcal-on-push-f7qsx-build-image-index-pod | init container: place-scripts&#xA;2026/04/19 13:56:12 Decoded script /tekton/scripts/script-0-qm8q7&#xA;2026/04/19 13:56:12 Decoded script /tekton/scripts/script-1-8g5dm&#xA;2026/04/19 13:56:12 Decoded script /tekton/scripts/script-2-vgtz7&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-build-image-index-pod | container step-build: &#xA;[2026-04-19T13:56:22,767437359+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Running konflux-build-cli&#xA;time=&#34;2026-04-19T13:56:25Z&#34; level=info msg=&#34;[param] image: quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#34;&#xA;time=&#34;2026-04-19T13:56:25Z&#34; level=info msg=&#34;[param] images: [quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958@sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625]&#34;&#xA;time=&#34;2026-04-19T13:56:25Z&#34; level=info msg=&#34;[param] buildah-format: docker&#34;&#xA;time=&#34;2026-04-19T13:56:25Z&#34; level=info msg=&#34;[param] always-build-index: false&#34;&#xA;time=&#34;2026-04-19T13:56:25Z&#34; level=info msg=&#34;[param] additional-tags: [konflux-demo-component-kcal-on-push-f7qsx-build-image-index]&#34;&#xA;time=&#34;2026-04-19T13:56:25Z&#34; level=info msg=&#34;[param] output-manifest-path: /index-build-data/manifest_data.json&#34;&#xA;time=&#34;2026-04-19T13:56:25Z&#34; level=info msg=&#34;[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST&#34;&#xA;time=&#34;2026-04-19T13:56:25Z&#34; level=info msg=&#34;[param] result-path-image-url: /tekton/results/IMAGE_URL&#34;&#xA;time=&#34;2026-04-19T13:56:25Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-04-19T13:56:25Z&#34; level=info msg=&#34;[param] result-path-images: /tekton/results/IMAGES&#34;&#xA;time=&#34;2026-04-19T13:56:25Z&#34; level=info msg=&#34;Creating manifest list: quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#34;&#xA;time=&#34;2026-04-19T13:56:25Z&#34; level=info msg=&#34;buildah [stdout] 253b1ff2bf5fc7ff783737e040a30861883fd20e0353a7408737fd071a868274&#34; logger=CliExecutor&#xA;time=&#34;2026-04-19T13:56:25Z&#34; level=info msg=&#34;Skipping image index generation. Returning results for single image.&#34;&#xA;{&#34;image_digest&#34;:&#34;sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625&#34;,&#34;image_url&#34;:&#34;quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#34;,&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625&#34;,&#34;images&#34;:&#34;quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625&#34;}&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-build-image-index-pod | container step-create-sbom: &#xA;The manifest_data.json file does not exist. Skipping the SBOM creation...&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-build-image-index-pod | container step-upload-sbom: &#xA;[2026-04-19T13:56:26,273140088+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;The index.spdx.json file does not exists. Skipping the SBOM upload...&#xA;&#xA; pod: konflux-demo-component-kcal-on-push-f7qsx-clair-scan-pod | init container: prepare&#xA;2026/04/19 14:00:13 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-kcal-on-push-f7qsx-clair-scan-pod | init container: place-scripts&#xA;2026/04/19 14:00:13 Decoded script /tekton/scripts/script-0-z7v25&#xA;2026/04/19 14:00:13 Decoded script /tekton/scripts/script-1-48vvz&#xA;2026/04/19 14:00:13 Decoded script /tekton/scripts/script-2-pd5pr&#xA;2026/04/19 14:00:13 Decoded script /tekton/scripts/script-3-hlknf&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-clair-scan-pod | container step-get-image-manifests: &#xA;Inspecting raw image manifest quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625.&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-clair-scan-pod | container step-get-vulnerabilities: &#xA;Running clair-action on amd64 image manifest...&#xA;�[90m2026-04-19T14:00:17Z�[0m �[32mINF�[0m �[1mmatchers created�[0m �[36mcomponent=�[0mlibvuln/New �[36mmatchers=�[0m[{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/suse&#34;,&#34;name&#34;:&#34;suse&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ubuntu&#34;,&#34;name&#34;:&#34;ubuntu-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel&#34;,&#34;name&#34;:&#34;rhel&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/gobin&#34;,&#34;name&#34;:&#34;gobin&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/java&#34;,&#34;name&#34;:&#34;java-maven&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/photon&#34;,&#34;name&#34;:&#34;photon&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/rhel/rhcc&#34;,&#34;name&#34;:&#34;rhel-container-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/alpine&#34;,&#34;name&#34;:&#34;alpine-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/debian&#34;,&#34;name&#34;:&#34;debian-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/oracle&#34;,&#34;name&#34;:&#34;oracle&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/ruby&#34;,&#34;name&#34;:&#34;ruby-gem&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/aws&#34;,&#34;name&#34;:&#34;aws-matcher&#34;},{&#34;docs&#34;:&#34;https://pkg.go.dev/github.com/quay/claircore/python&#34;,&#34;name&#34;:&#34;python&#34;}]&#xA;�[90m2026-04-19T14:00:17Z�[0m �[32mINF�[0m �[1mlibvuln initialized�[0m �[36mcomponent=�[0mlibvuln/New&#xA;�[90m2026-04-19T14:00:18Z�[0m �[32mINF�[0m �[1mregistered configured scanners�[0m �[36mcomponent=�[0mlibindex/New&#xA;�[90m2026-04-19T14:00:18Z�[0m �[32mINF�[0m �[1mNewLayerScanner: constructing a new layer-scanner�[0m �[36mcomponent=�[0mindexer.NewLayerScanner&#xA;�[90m2026-04-19T14:00:18Z�[0m �[32mINF�[0m �[1mindex request start�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625&#xA;�[90m2026-04-19T14:00:18Z�[0m �[32mINF�[0m �[1mstarting scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625&#xA;�[90m2026-04-19T14:00:18Z�[0m �[32mINF�[0m �[1mmanifest to be scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625 �[36mstate=�[0mCheckManifest&#xA;�[90m2026-04-19T14:00:18Z�[0m �[32mINF�[0m �[1mlayers fetch start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-19T14:00:20Z�[0m �[32mINF�[0m �[1mlayers fetch success�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-19T14:00:20Z�[0m �[32mINF�[0m �[1mlayers fetch done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625 �[36mstate=�[0mFetchLayers&#xA;�[90m2026-04-19T14:00:20Z�[0m �[32mINF�[0m �[1mlayers scan start�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625 �[36mstate=�[0mScanLayers&#xA;�[90m2026-04-19T14:00:20Z�[0m �[32mINF�[0m �[1mfound buildinfo Dockerfile�[0m �[36mcomponent=�[0mrhel/rhcc/scanner.Scan �[36mkind=�[0mpackage �[36mlayer=�[0msha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2 �[36mmanifest=�[0msha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625 �[36mpath=�[0mroot/buildinfo/Dockerfile-ubi8-openjdk-17-runtime-1.23-4.1776047406 �[36mscanner=�[0mrhel_containerscanner �[36mstate=�[0mScanLayers&#xA;�[90m2026-04-19T14:00:20Z�[0m �[32mINF�[0m �[1mskipping jar�[0m �[36mcomponent=�[0mjava/Scanner.Scan �[36mfile=�[0musr/lib/jvm/java-17-openjdk-17.0.18.0.8-1.el8.x86_64/lib/jrt-fs.jar �[36mkind=�[0mpackage �[36mlayer=�[0msha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2 �[36mmanifest=�[0msha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625 �[36mreason=�[0m&#34;jar: unidentified jar: jrt-fs.jar&#34; �[36mscanner=�[0mjava �[36mstate=�[0mScanLayers �[36mversion=�[0m6&#xA;�[90m2026-04-19T14:00:20Z�[0m �[32mINF�[0m �[1mlayers scan done�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625 �[36mstate=�[0mScanLayers&#xA;�[90m2026-04-19T14:00:20Z�[0m �[32mINF�[0m �[1mstarting index manifest�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625 �[36mstate=�[0mIndexManifest&#xA;�[90m2026-04-19T14:00:20Z�[0m �[32mINF�[0m �[1mfinishing scan�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625 �[36mstate=�[0mIndexFinished&#xA;�[90m2026-04-19T14:00:20Z�[0m �[32mINF�[0m �[1mmanifest successfully scanned�[0m �[36mcomponent=�[0mindexer/controller/Controller.Index �[36mmanifest=�[0msha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625 �[36mstate=�[0mIndexFinished&#xA;�[90m2026-04-19T14:00:21Z�[0m �[32mINF�[0m �[1mindex request done�[0m �[36mcomponent=�[0mlibindex/Libindex.Index �[36mmanifest=�[0msha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625&#xA;{&#xA;  &#34;manifest_hash&#34;: &#34;sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625&#34;,&#xA;  &#34;packages&#34;: {&#xA;    &#34;+XM+s3niWaEk1U5jnR5DpA==&#34;: {&#xA;      &#34;id&#34;: &#34;+XM+s3niWaEk1U5jnR5DpA==&#34;,&#xA;      &#34;name&#34;: &#34;libyaml&#34;,&#xA;      &#34;version&#34;: &#34;0.1.7-5.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libyaml&#34;,&#xA;        &#34;version&#34;: &#34;0.1.7-5.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+Xr7HyTxXf0c8jLaUyo3xA==&#34;: {&#xA;      &#34;id&#34;: &#34;+Xr7HyTxXf0c8jLaUyo3xA==&#34;,&#xA;      &#34;name&#34;: &#34;libidn2&#34;,&#xA;      &#34;version&#34;: &#34;2.2.0-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libidn2&#34;,&#xA;        &#34;version&#34;: &#34;2.2.0-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+hvIC0Et/RtHi7EAFCmfEw==&#34;: {&#xA;      &#34;id&#34;: &#34;+hvIC0Et/RtHi7EAFCmfEw==&#34;,&#xA;      &#34;name&#34;: &#34;file-libs&#34;,&#xA;      &#34;version&#34;: &#34;5.33-27.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;file&#34;,&#xA;        &#34;version&#34;: &#34;5.33-27.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;+qrxjVH7Im8eBfrz4h4P/w==&#34;: {&#xA;      &#34;id&#34;: &#34;+qrxjVH7Im8eBfrz4h4P/w==&#34;,&#xA;      &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;      &#34;version&#34;: &#34;2:4.6-23.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;        &#34;version&#34;: &#34;4.6-23.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/ji9IJ9FfNcwqVRbMWZshQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/ji9IJ9FfNcwqVRbMWZshQ==&#34;,&#xA;      &#34;name&#34;: &#34;nss-softokn-freebl&#34;,&#xA;      &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nss&#34;,&#xA;        &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0+9x6aIRcNDCM7R94cpzew==&#34;: {&#xA;      &#34;id&#34;: &#34;0+9x6aIRcNDCM7R94cpzew==&#34;,&#xA;      &#34;name&#34;: &#34;java-17-openjdk-headless&#34;,&#xA;      &#34;version&#34;: &#34;1:17.0.18.0.8-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;17.0.18.0.8-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1gormAsAjMuks2JveQRd0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;1gormAsAjMuks2JveQRd0Q==&#34;,&#xA;      &#34;name&#34;: &#34;gobject-introspection&#34;,&#xA;      &#34;version&#34;: &#34;1.56.1-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gobject-introspection&#34;,&#xA;        &#34;version&#34;: &#34;1.56.1-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;22yBCZl99yVP86UHT7jTdw==&#34;: {&#xA;      &#34;id&#34;: &#34;22yBCZl99yVP86UHT7jTdw==&#34;,&#xA;      &#34;name&#34;: &#34;tzdata&#34;,&#xA;      &#34;version&#34;: &#34;2026a-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tzdata&#34;,&#xA;        &#34;version&#34;: &#34;2026a-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2PBlaOceApWEi634ZUHO/g==&#34;: {&#xA;      &#34;id&#34;: &#34;2PBlaOceApWEi634ZUHO/g==&#34;,&#xA;      &#34;name&#34;: &#34;platform-python&#34;,&#xA;      &#34;version&#34;: &#34;3.6.8-75.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;3.6.8-75.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3+d+oaGDGj9g2+1RFZjY5A==&#34;: {&#xA;      &#34;id&#34;: &#34;3+d+oaGDGj9g2+1RFZjY5A==&#34;,&#xA;      &#34;name&#34;: &#34;gmp&#34;,&#xA;      &#34;version&#34;: &#34;1:6.1.2-11.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gmp&#34;,&#xA;        &#34;version&#34;: &#34;6.1.2-11.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3OVNevSm98h4f1fmX4IZwQ==&#34;: {&#xA;      &#34;id&#34;: &#34;3OVNevSm98h4f1fmX4IZwQ==&#34;,&#xA;      &#34;name&#34;: &#34;org.example:simple-java-project&#34;,&#xA;      &#34;version&#34;: &#34;1.0-SNAPSHOT&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3jI2apoRMNGhHa141Q5dlQ==&#34;: {&#xA;      &#34;id&#34;: &#34;3jI2apoRMNGhHa141Q5dlQ==&#34;,&#xA;      &#34;name&#34;: &#34;libksba&#34;,&#xA;      &#34;version&#34;: &#34;1.3.5-9.el8_7&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libksba&#34;,&#xA;        &#34;version&#34;: &#34;1.3.5-9.el8_7&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3uSX4NgBxQvC8LEk48QoOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;3uSX4NgBxQvC8LEk48QoOQ==&#34;,&#xA;      &#34;name&#34;: &#34;cyrus-sasl-lib&#34;,&#xA;      &#34;version&#34;: &#34;2.1.27-6.el8_5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cyrus-sasl&#34;,&#xA;        &#34;version&#34;: &#34;2.1.27-6.el8_5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;45rvgYmy022Tx6fVWfking==&#34;: {&#xA;      &#34;id&#34;: &#34;45rvgYmy022Tx6fVWfking==&#34;,&#xA;      &#34;name&#34;: &#34;publicsuffix-list-dafsa&#34;,&#xA;      &#34;version&#34;: &#34;20180723-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;publicsuffix-list&#34;,&#xA;        &#34;version&#34;: &#34;20180723-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;47OMpR7yEmE4lttsyWq3fw==&#34;: {&#xA;      &#34;id&#34;: &#34;47OMpR7yEmE4lttsyWq3fw==&#34;,&#xA;      &#34;name&#34;: &#34;libusbx&#34;,&#xA;      &#34;version&#34;: &#34;1.0.23-4.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libusbx&#34;,&#xA;        &#34;version&#34;: &#34;1.0.23-4.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4ZgMXaHDWnwPnqKlcJzEIw==&#34;: {&#xA;      &#34;id&#34;: &#34;4ZgMXaHDWnwPnqKlcJzEIw==&#34;,&#xA;      &#34;name&#34;: &#34;krb5-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.18.2-32.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;krb5&#34;,&#xA;        &#34;version&#34;: &#34;1.18.2-32.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4flTdmUV4iK1Ax+LXJm8qQ==&#34;: {&#xA;      &#34;id&#34;: &#34;4flTdmUV4iK1Ax+LXJm8qQ==&#34;,&#xA;      &#34;name&#34;: &#34;gnutls&#34;,&#xA;      &#34;version&#34;: &#34;3.6.16-8.el8_10.5&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;3.6.16-8.el8_10.5&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4sG4bBloak5Sz907ZDRs6Q==&#34;: {&#xA;      &#34;id&#34;: &#34;4sG4bBloak5Sz907ZDRs6Q==&#34;,&#xA;      &#34;name&#34;: &#34;libnsl2&#34;,&#xA;      &#34;version&#34;: &#34;1.2.0-2.20180605git4a062cf.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libnsl2&#34;,&#xA;        &#34;version&#34;: &#34;1.2.0-2.20180605git4a062cf.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4uQuJg+li+gGAwnGRDcs+w==&#34;: {&#xA;      &#34;id&#34;: &#34;4uQuJg+li+gGAwnGRDcs+w==&#34;,&#xA;      &#34;name&#34;: &#34;nss&#34;,&#xA;      &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nss&#34;,&#xA;        &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5U8sNbKx0xZsaHcVt4MmxA==&#34;: {&#xA;      &#34;id&#34;: &#34;5U8sNbKx0xZsaHcVt4MmxA==&#34;,&#xA;      &#34;name&#34;: &#34;chkconfig&#34;,&#xA;      &#34;version&#34;: &#34;1.19.2-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;chkconfig&#34;,&#xA;        &#34;version&#34;: &#34;1.19.2-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;67DLnC895xbDFuD3MGhCtQ==&#34;: {&#xA;      &#34;id&#34;: &#34;67DLnC895xbDFuD3MGhCtQ==&#34;,&#xA;      &#34;name&#34;: &#34;io.github.stuartwdouglas.hacbs-test.simple:simple-jdk8&#34;,&#xA;      &#34;version&#34;: &#34;1.2.4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6KnijwRsfeerWmf5Zl8NWw==&#34;: {&#xA;      &#34;id&#34;: &#34;6KnijwRsfeerWmf5Zl8NWw==&#34;,&#xA;      &#34;name&#34;: &#34;sed&#34;,&#xA;      &#34;version&#34;: &#34;4.5-5.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sed&#34;,&#xA;        &#34;version&#34;: &#34;4.5-5.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7eg89eCgA75bJ7WhhN/T4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;7eg89eCgA75bJ7WhhN/T4Q==&#34;,&#xA;      &#34;name&#34;: &#34;libtasn1&#34;,&#xA;      &#34;version&#34;: &#34;4.13-5.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1&#34;,&#xA;        &#34;version&#34;: &#34;4.13-5.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9uhqFNTCJ7/bpzSlc7qCaQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9uhqFNTCJ7/bpzSlc7qCaQ==&#34;,&#xA;      &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;      &#34;version&#34;: &#34;1.8.5-7.el8_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;        &#34;version&#34;: &#34;1.8.5-7.el8_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AIs6pmCup5N9+6Ag6e2/og==&#34;: {&#xA;      &#34;id&#34;: &#34;AIs6pmCup5N9+6Ag6e2/og==&#34;,&#xA;      &#34;name&#34;: &#34;openssl-libs&#34;,&#xA;      &#34;version&#34;: &#34;1:1.1.1k-15.el8_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;1.1.1k-15.el8_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AuC6XQzcU/5tB4luIfjLFg==&#34;: {&#xA;      &#34;id&#34;: &#34;AuC6XQzcU/5tB4luIfjLFg==&#34;,&#xA;      &#34;name&#34;: &#34;elfutils-libelf&#34;,&#xA;      &#34;version&#34;: &#34;0.190-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;elfutils&#34;,&#xA;        &#34;version&#34;: &#34;0.190-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AziZ1oGI+oDXVPzldKNj+w==&#34;: {&#xA;      &#34;id&#34;: &#34;AziZ1oGI+oDXVPzldKNj+w==&#34;,&#xA;      &#34;name&#34;: &#34;openldap&#34;,&#xA;      &#34;version&#34;: &#34;2.4.46-21.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openldap&#34;,&#xA;        &#34;version&#34;: &#34;2.4.46-21.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BPsD0kkdIoK3KQUZ5DpJjw==&#34;: {&#xA;      &#34;id&#34;: &#34;BPsD0kkdIoK3KQUZ5DpJjw==&#34;,&#xA;      &#34;name&#34;: &#34;dbus-libs&#34;,&#xA;      &#34;version&#34;: &#34;1:1.12.8-27.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dbus&#34;,&#xA;        &#34;version&#34;: &#34;1.12.8-27.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BmK1zIjr5KsuOODCYwxRCw==&#34;: {&#xA;      &#34;id&#34;: &#34;BmK1zIjr5KsuOODCYwxRCw==&#34;,&#xA;      &#34;name&#34;: &#34;libpsl&#34;,&#xA;      &#34;version&#34;: &#34;0.20.2-6.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpsl&#34;,&#xA;        &#34;version&#34;: &#34;0.20.2-6.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;CbqHQON08ZsUvPS9XDaTFA==&#34;: {&#xA;      &#34;id&#34;: &#34;CbqHQON08ZsUvPS9XDaTFA==&#34;,&#xA;      &#34;name&#34;: &#34;rpm&#34;,&#xA;      &#34;version&#34;: &#34;4.14.3-32.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;4.14.3-32.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Cklbj7Y2kf3vqxqc0m1GHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Cklbj7Y2kf3vqxqc0m1GHQ==&#34;,&#xA;      &#34;name&#34;: &#34;librhsm&#34;,&#xA;      &#34;version&#34;: &#34;0.0.3-5.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;librhsm&#34;,&#xA;        &#34;version&#34;: &#34;0.0.3-5.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;D/ASdBsgxLNlG5Q8U7UPsQ==&#34;: {&#xA;      &#34;id&#34;: &#34;D/ASdBsgxLNlG5Q8U7UPsQ==&#34;,&#xA;      &#34;name&#34;: &#34;rootfiles&#34;,&#xA;      &#34;version&#34;: &#34;8.1-22.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rootfiles&#34;,&#xA;        &#34;version&#34;: &#34;8.1-22.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;D9iJYSwBt2n6JCuuNo2fKg==&#34;: {&#xA;      &#34;id&#34;: &#34;D9iJYSwBt2n6JCuuNo2fKg==&#34;,&#xA;      &#34;name&#34;: &#34;audit-libs&#34;,&#xA;      &#34;version&#34;: &#34;3.1.2-1.el8_10.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;audit&#34;,&#xA;        &#34;version&#34;: &#34;3.1.2-1.el8_10.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DV119Dw0W4RdsbJkdoHU9w==&#34;: {&#xA;      &#34;id&#34;: &#34;DV119Dw0W4RdsbJkdoHU9w==&#34;,&#xA;      &#34;name&#34;: &#34;curl&#34;,&#xA;      &#34;version&#34;: &#34;7.61.1-34.el8_10.11&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;7.61.1-34.el8_10.11&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DgyhtZBcSIlVmY6xC8s1mA==&#34;: {&#xA;      &#34;id&#34;: &#34;DgyhtZBcSIlVmY6xC8s1mA==&#34;,&#xA;      &#34;name&#34;: &#34;coreutils-single&#34;,&#xA;      &#34;version&#34;: &#34;8.30-17.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;8.30-17.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EGfzPeF6a5hj9x4BwoN25A==&#34;: {&#xA;      &#34;id&#34;: &#34;EGfzPeF6a5hj9x4BwoN25A==&#34;,&#xA;      &#34;name&#34;: &#34;libcap&#34;,&#xA;      &#34;version&#34;: &#34;2.48-6.el8_9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap&#34;,&#xA;        &#34;version&#34;: &#34;2.48-6.el8_9&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EiNiLT8ulizCzEWcybhizQ==&#34;: {&#xA;      &#34;id&#34;: &#34;EiNiLT8ulizCzEWcybhizQ==&#34;,&#xA;      &#34;name&#34;: &#34;lz4-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.8.3-5.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lz4&#34;,&#xA;        &#34;version&#34;: &#34;1.8.3-5.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;F7AOP7tK5AfUXV1g9iTzFA==&#34;: {&#xA;      &#34;id&#34;: &#34;F7AOP7tK5AfUXV1g9iTzFA==&#34;,&#xA;      &#34;name&#34;: &#34;mpfr&#34;,&#xA;      &#34;version&#34;: &#34;3.1.6-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;mpfr&#34;,&#xA;        &#34;version&#34;: &#34;3.1.6-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FS5/DAbDsXWURU9onlACPA==&#34;: {&#xA;      &#34;id&#34;: &#34;FS5/DAbDsXWURU9onlACPA==&#34;,&#xA;      &#34;name&#34;: &#34;alsa-lib&#34;,&#xA;      &#34;version&#34;: &#34;1.2.10-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;alsa-lib&#34;,&#xA;        &#34;version&#34;: &#34;1.2.10-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;G+gX+j4AbiCorxKiF1UojA==&#34;: {&#xA;      &#34;id&#34;: &#34;G+gX+j4AbiCorxKiF1UojA==&#34;,&#xA;      &#34;name&#34;: &#34;libsolv&#34;,&#xA;      &#34;version&#34;: &#34;0.7.20-6.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsolv&#34;,&#xA;        &#34;version&#34;: &#34;0.7.20-6.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;GLKhGblbPbPbtDKwfpCv5A==&#34;: {&#xA;      &#34;id&#34;: &#34;GLKhGblbPbPbtDKwfpCv5A==&#34;,&#xA;      &#34;name&#34;: &#34;filesystem&#34;,&#xA;      &#34;version&#34;: &#34;3.8-6.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;filesystem&#34;,&#xA;        &#34;version&#34;: &#34;3.8-6.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Gg1Q6hponuT1eSJHwaJ83w==&#34;: {&#xA;      &#34;id&#34;: &#34;Gg1Q6hponuT1eSJHwaJ83w==&#34;,&#xA;      &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;      &#34;version&#34;: &#34;0.7.11-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap-ng&#34;,&#xA;        &#34;version&#34;: &#34;0.7.11-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HMIoZ/TKrKhxI1rD26qmpw==&#34;: {&#xA;      &#34;id&#34;: &#34;HMIoZ/TKrKhxI1rD26qmpw==&#34;,&#xA;      &#34;name&#34;: &#34;json-c&#34;,&#xA;      &#34;version&#34;: &#34;0.13.1-3.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;json-c&#34;,&#xA;        &#34;version&#34;: &#34;0.13.1-3.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IzLcxZDtcvtJR5Gwdq9HDg==&#34;: {&#xA;      &#34;id&#34;: &#34;IzLcxZDtcvtJR5Gwdq9HDg==&#34;,&#xA;      &#34;name&#34;: &#34;libattr&#34;,&#xA;      &#34;version&#34;: &#34;2.4.48-3.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;attr&#34;,&#xA;        &#34;version&#34;: &#34;2.4.48-3.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;J34PJ2GThOWZuKVgFIoieA==&#34;: {&#xA;      &#34;id&#34;: &#34;J34PJ2GThOWZuKVgFIoieA==&#34;,&#xA;      &#34;name&#34;: &#34;zlib&#34;,&#xA;      &#34;version&#34;: &#34;1.2.11-25.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;1.2.11-25.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;JNDNKhJbFTSevs7EALfE9A==&#34;: {&#xA;      &#34;id&#34;: &#34;JNDNKhJbFTSevs7EALfE9A==&#34;,&#xA;      &#34;name&#34;: &#34;p11-kit&#34;,&#xA;      &#34;version&#34;: &#34;0.23.22-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;p11-kit&#34;,&#xA;        &#34;version&#34;: &#34;0.23.22-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;JvPeDbC4IianXNphFOy9jw==&#34;: {&#xA;      &#34;id&#34;: &#34;JvPeDbC4IianXNphFOy9jw==&#34;,&#xA;      &#34;name&#34;: &#34;openjdk-17-runtime-ubi8-container&#34;,&#xA;      &#34;version&#34;: &#34;1.23-4.1776047406&#34;,&#xA;      &#34;kind&#34;: &#34;source&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;rhctag:1.23.0.0.0.0.0.0.0.0&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LXiVkIlXLq/usMYIwCTH8Q==&#34;: {&#xA;      &#34;id&#34;: &#34;LXiVkIlXLq/usMYIwCTH8Q==&#34;,&#xA;      &#34;name&#34;: &#34;libsmartcols&#34;,&#xA;      &#34;version&#34;: &#34;2.32.1-48.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.32.1-48.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LkoLKEri5dIAb0vFMkSOag==&#34;: {&#xA;      &#34;id&#34;: &#34;LkoLKEri5dIAb0vFMkSOag==&#34;,&#xA;      &#34;name&#34;: &#34;glibc-common&#34;,&#xA;      &#34;version&#34;: &#34;2.28-251.el8_10.31&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.28-251.el8_10.31&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;N1RbIRo2SyHosQefv+skDw==&#34;: {&#xA;      &#34;id&#34;: &#34;N1RbIRo2SyHosQefv+skDw==&#34;,&#xA;      &#34;name&#34;: &#34;gawk&#34;,&#xA;      &#34;version&#34;: &#34;4.2.1-4.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gawk&#34;,&#xA;        &#34;version&#34;: &#34;4.2.1-4.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;N3ZaMrNJKoumMpaY0smlMQ==&#34;: {&#xA;      &#34;id&#34;: &#34;N3ZaMrNJKoumMpaY0smlMQ==&#34;,&#xA;      &#34;name&#34;: &#34;sqlite-libs&#34;,&#xA;      &#34;version&#34;: &#34;3.26.0-20.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;3.26.0-20.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;N5EuVcX6TPHBo7OPtax5uA==&#34;: {&#xA;      &#34;id&#34;: &#34;N5EuVcX6TPHBo7OPtax5uA==&#34;,&#xA;      &#34;name&#34;: &#34;crypto-policies-scripts&#34;,&#xA;      &#34;version&#34;: &#34;20230731-1.git3177e06.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;        &#34;version&#34;: &#34;20230731-1.git3177e06.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NJbhst8VIOwst++ZzRP6tA==&#34;: {&#xA;      &#34;id&#34;: &#34;NJbhst8VIOwst++ZzRP6tA==&#34;,&#xA;      &#34;name&#34;: &#34;libpeas&#34;,&#xA;      &#34;version&#34;: &#34;1.22.0-6.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libpeas&#34;,&#xA;        &#34;version&#34;: &#34;1.22.0-6.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NguWV8S6YQYvQsGQDJm2Rg==&#34;: {&#xA;      &#34;id&#34;: &#34;NguWV8S6YQYvQsGQDJm2Rg==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-base&#34;,&#xA;      &#34;version&#34;: &#34;6.1-10.20180224.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.1-10.20180224.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;NsvPyDc//39XTuXcn3j2uQ==&#34;: {&#xA;      &#34;id&#34;: &#34;NsvPyDc//39XTuXcn3j2uQ==&#34;,&#xA;      &#34;name&#34;: &#34;gdbm&#34;,&#xA;      &#34;version&#34;: &#34;1:1.18-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdbm&#34;,&#xA;        &#34;version&#34;: &#34;1.18-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ORsDK2A5479NPB0r01PoXQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ORsDK2A5479NPB0r01PoXQ==&#34;,&#xA;      &#34;name&#34;: &#34;libcurl&#34;,&#xA;      &#34;version&#34;: &#34;7.61.1-34.el8_10.11&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;7.61.1-34.el8_10.11&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;P5Se4zJpr8ZUwZNUojfuzA==&#34;: {&#xA;      &#34;id&#34;: &#34;P5Se4zJpr8ZUwZNUojfuzA==&#34;,&#xA;      &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;      &#34;version&#34;: &#34;4.1.1-6.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxcrypt&#34;,&#xA;        &#34;version&#34;: &#34;4.1.1-6.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;POPH5BJ/Q4Bfen05TT291g==&#34;: {&#xA;      &#34;id&#34;: &#34;POPH5BJ/Q4Bfen05TT291g==&#34;,&#xA;      &#34;name&#34;: &#34;nss-util&#34;,&#xA;      &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nss&#34;,&#xA;        &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Q0uPb/t/3IQ8GEwlv/J3Cw==&#34;: {&#xA;      &#34;id&#34;: &#34;Q0uPb/t/3IQ8GEwlv/J3Cw==&#34;,&#xA;      &#34;name&#34;: &#34;libmount&#34;,&#xA;      &#34;version&#34;: &#34;2.32.1-48.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.32.1-48.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QC6e3OaV78mjs678tGU2KQ==&#34;: {&#xA;      &#34;id&#34;: &#34;QC6e3OaV78mjs678tGU2KQ==&#34;,&#xA;      &#34;name&#34;: &#34;libssh&#34;,&#xA;      &#34;version&#34;: &#34;0.9.6-16.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;0.9.6-16.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QXEDMSZisv5SUXtJo7Fs5g==&#34;: {&#xA;      &#34;id&#34;: &#34;QXEDMSZisv5SUXtJo7Fs5g==&#34;,&#xA;      &#34;name&#34;: &#34;gpgme&#34;,&#xA;      &#34;version&#34;: &#34;1.13.1-12.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gpgme&#34;,&#xA;        &#34;version&#34;: &#34;1.13.1-12.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RKXYZTbYgViwzC05uqeDSg==&#34;: {&#xA;      &#34;id&#34;: &#34;RKXYZTbYgViwzC05uqeDSg==&#34;,&#xA;      &#34;name&#34;: &#34;io.github.stuartwdouglas.hacbs-test.simple:simple-jdk17&#34;,&#xA;      &#34;version&#34;: &#34;0.1.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RRWuvyUdhwGbBo2a/Ra1hw==&#34;: {&#xA;      &#34;id&#34;: &#34;RRWuvyUdhwGbBo2a/Ra1hw==&#34;,&#xA;      &#34;name&#34;: &#34;libselinux&#34;,&#xA;      &#34;version&#34;: &#34;2.9-11.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libselinux&#34;,&#xA;        &#34;version&#34;: &#34;2.9-11.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RtrzwDgrQgu9S5B72s2sww==&#34;: {&#xA;      &#34;id&#34;: &#34;RtrzwDgrQgu9S5B72s2sww==&#34;,&#xA;      &#34;name&#34;: &#34;libunistring&#34;,&#xA;      &#34;version&#34;: &#34;0.9.9-3.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libunistring&#34;,&#xA;        &#34;version&#34;: &#34;0.9.9-3.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;TARQvmsLVC/S1fQD1jO4Xw==&#34;: {&#xA;      &#34;id&#34;: &#34;TARQvmsLVC/S1fQD1jO4Xw==&#34;,&#xA;      &#34;name&#34;: &#34;gdbm-libs&#34;,&#xA;      &#34;version&#34;: &#34;1:1.18-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gdbm&#34;,&#xA;        &#34;version&#34;: &#34;1.18-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;U3ZkYu9FoEzQITrVBlQtLA==&#34;: {&#xA;      &#34;id&#34;: &#34;U3ZkYu9FoEzQITrVBlQtLA==&#34;,&#xA;      &#34;name&#34;: &#34;glibc&#34;,&#xA;      &#34;version&#34;: &#34;2.28-251.el8_10.31&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.28-251.el8_10.31&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;USWNn71p+k059dbiu5HDEA==&#34;: {&#xA;      &#34;id&#34;: &#34;USWNn71p+k059dbiu5HDEA==&#34;,&#xA;      &#34;name&#34;: &#34;libassuan&#34;,&#xA;      &#34;version&#34;: &#34;2.5.1-3.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libassuan&#34;,&#xA;        &#34;version&#34;: &#34;2.5.1-3.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UUZyda9G/ffvF6rJ5W1UnQ==&#34;: {&#xA;      &#34;id&#34;: &#34;UUZyda9G/ffvF6rJ5W1UnQ==&#34;,&#xA;      &#34;name&#34;: &#34;libstdc++&#34;,&#xA;      &#34;version&#34;: &#34;8.5.0-28.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;8.5.0-28.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Vax934M9zGbzjdT3Y/XU9w==&#34;: {&#xA;      &#34;id&#34;: &#34;Vax934M9zGbzjdT3Y/XU9w==&#34;,&#xA;      &#34;name&#34;: &#34;glibc-minimal-langpack&#34;,&#xA;      &#34;version&#34;: &#34;2.28-251.el8_10.31&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;2.28-251.el8_10.31&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VrCmPwuY69qW5jl9ctxOZg==&#34;: {&#xA;      &#34;id&#34;: &#34;VrCmPwuY69qW5jl9ctxOZg==&#34;,&#xA;      &#34;name&#34;: &#34;libtirpc&#34;,&#xA;      &#34;version&#34;: &#34;1.1.4-12.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtirpc&#34;,&#xA;        &#34;version&#34;: &#34;1.1.4-12.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;W66WOQ3v6r7mSn6+o7gaew==&#34;: {&#xA;      &#34;id&#34;: &#34;W66WOQ3v6r7mSn6+o7gaew==&#34;,&#xA;      &#34;name&#34;: &#34;popt&#34;,&#xA;      &#34;version&#34;: &#34;1.18-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;popt&#34;,&#xA;        &#34;version&#34;: &#34;1.18-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Wq1n4jzKBPdL9z5l5HD99w==&#34;: {&#xA;      &#34;id&#34;: &#34;Wq1n4jzKBPdL9z5l5HD99w==&#34;,&#xA;      &#34;name&#34;: &#34;libarchive&#34;,&#xA;      &#34;version&#34;: &#34;3.3.3-6.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;3.3.3-6.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YjDcGmvP0/z8VqRiUvkhOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;YjDcGmvP0/z8VqRiUvkhOQ==&#34;,&#xA;      &#34;name&#34;: &#34;gnupg2&#34;,&#xA;      &#34;version&#34;: &#34;2.2.20-4.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;2.2.20-4.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Za0y7YiKRidyIBZNIzq/Ng==&#34;: {&#xA;      &#34;id&#34;: &#34;Za0y7YiKRidyIBZNIzq/Ng==&#34;,&#xA;      &#34;name&#34;: &#34;librepo&#34;,&#xA;      &#34;version&#34;: &#34;1.14.2-5.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;librepo&#34;,&#xA;        &#34;version&#34;: &#34;1.14.2-5.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ar0do80Wlk1FaVvtx66g6Q==&#34;: {&#xA;      &#34;id&#34;: &#34;ar0do80Wlk1FaVvtx66g6Q==&#34;,&#xA;      &#34;name&#34;: &#34;brotli&#34;,&#xA;      &#34;version&#34;: &#34;1.0.6-4.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;brotli&#34;,&#xA;        &#34;version&#34;: &#34;1.0.6-4.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;auI8KtI6OozP7EAIr9UlQQ==&#34;: {&#xA;      &#34;id&#34;: &#34;auI8KtI6OozP7EAIr9UlQQ==&#34;,&#xA;      &#34;name&#34;: &#34;pcre2&#34;,&#xA;      &#34;version&#34;: &#34;10.32-3.el8_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;10.32-3.el8_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bWUdPEYmtshwdmuX5VapfQ==&#34;: {&#xA;      &#34;id&#34;: &#34;bWUdPEYmtshwdmuX5VapfQ==&#34;,&#xA;      &#34;name&#34;: &#34;libblkid&#34;,&#xA;      &#34;version&#34;: &#34;2.32.1-48.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.32.1-48.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;bmxL3lydQy0yU8g1iBgovg==&#34;: {&#xA;      &#34;id&#34;: &#34;bmxL3lydQy0yU8g1iBgovg==&#34;,&#xA;      &#34;name&#34;: &#34;libsepol&#34;,&#xA;      &#34;version&#34;: &#34;2.9-3.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsepol&#34;,&#xA;        &#34;version&#34;: &#34;2.9-3.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cXCMP7NdkMDf1+Rb1IEktQ==&#34;: {&#xA;      &#34;id&#34;: &#34;cXCMP7NdkMDf1+Rb1IEktQ==&#34;,&#xA;      &#34;name&#34;: &#34;libsemanage&#34;,&#xA;      &#34;version&#34;: &#34;2.9-12.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsemanage&#34;,&#xA;        &#34;version&#34;: &#34;2.9-12.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dOBT1Qffq44NOVuk9chDyg==&#34;: {&#xA;      &#34;id&#34;: &#34;dOBT1Qffq44NOVuk9chDyg==&#34;,&#xA;      &#34;name&#34;: &#34;readline&#34;,&#xA;      &#34;version&#34;: &#34;7.0-10.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;readline&#34;,&#xA;        &#34;version&#34;: &#34;7.0-10.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dOwQwVL1NxmF6ouACZklrQ==&#34;: {&#xA;      &#34;id&#34;: &#34;dOwQwVL1NxmF6ouACZklrQ==&#34;,&#xA;      &#34;name&#34;: &#34;p11-kit-trust&#34;,&#xA;      &#34;version&#34;: &#34;0.23.22-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;p11-kit&#34;,&#xA;        &#34;version&#34;: &#34;0.23.22-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dSjxsaDISLUiFwRTCSO8Tg==&#34;: {&#xA;      &#34;id&#34;: &#34;dSjxsaDISLUiFwRTCSO8Tg==&#34;,&#xA;      &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;      &#34;version&#34;: &#34;20230731-1.git3177e06.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;crypto-policies&#34;,&#xA;        &#34;version&#34;: &#34;20230731-1.git3177e06.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;dtGaxafuhIU1Ppty914fJw==&#34;: {&#xA;      &#34;id&#34;: &#34;dtGaxafuhIU1Ppty914fJw==&#34;,&#xA;      &#34;name&#34;: &#34;nspr&#34;,&#xA;      &#34;version&#34;: &#34;4.36.0-2.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nspr&#34;,&#xA;        &#34;version&#34;: &#34;4.36.0-2.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eZ7CwFvwDCQu4vzKyuIZgA==&#34;: {&#xA;      &#34;id&#34;: &#34;eZ7CwFvwDCQu4vzKyuIZgA==&#34;,&#xA;      &#34;name&#34;: &#34;basesystem&#34;,&#xA;      &#34;version&#34;: &#34;11-5.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;basesystem&#34;,&#xA;        &#34;version&#34;: &#34;11-5.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;f/Al/eNlUhjEgKSV0J2z7w==&#34;: {&#xA;      &#34;id&#34;: &#34;f/Al/eNlUhjEgKSV0J2z7w==&#34;,&#xA;      &#34;name&#34;: &#34;python3-pip-wheel&#34;,&#xA;      &#34;version&#34;: &#34;9.0.3-24.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;9.0.3-24.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;f1lteJj1IxLDbDb+BI8yjg==&#34;: {&#xA;      &#34;id&#34;: &#34;f1lteJj1IxLDbDb+BI8yjg==&#34;,&#xA;      &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;      &#34;version&#34;: &#34;2025.2.80_v9.0.304-80.2.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ca-certificates&#34;,&#xA;        &#34;version&#34;: &#34;2025.2.80_v9.0.304-80.2.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;g146nKetkX1f4hfH1b5RWA==&#34;: {&#xA;      &#34;id&#34;: &#34;g146nKetkX1f4hfH1b5RWA==&#34;,&#xA;      &#34;name&#34;: &#34;libdb&#34;,&#xA;      &#34;version&#34;: &#34;5.3.28-42.el8_4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libdb&#34;,&#xA;        &#34;version&#34;: &#34;5.3.28-42.el8_4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gMqsUnRclTj6iuxHCslNRA==&#34;: {&#xA;      &#34;id&#34;: &#34;gMqsUnRclTj6iuxHCslNRA==&#34;,&#xA;      &#34;name&#34;: &#34;libdnf&#34;,&#xA;      &#34;version&#34;: &#34;0.63.0-21.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libdnf&#34;,&#xA;        &#34;version&#34;: &#34;0.63.0-21.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gOaN4treTmKK7tU+N6AZ1w==&#34;: {&#xA;      &#34;id&#34;: &#34;gOaN4treTmKK7tU+N6AZ1w==&#34;,&#xA;      &#34;name&#34;: &#34;pcre&#34;,&#xA;      &#34;version&#34;: &#34;8.42-6.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre&#34;,&#xA;        &#34;version&#34;: &#34;8.42-6.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gtbMsmX05ZWh+bkM1Wprlw==&#34;: {&#xA;      &#34;id&#34;: &#34;gtbMsmX05ZWh+bkM1Wprlw==&#34;,&#xA;      &#34;name&#34;: &#34;bash&#34;,&#xA;      &#34;version&#34;: &#34;4.4.20-6.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bash&#34;,&#xA;        &#34;version&#34;: &#34;4.4.20-6.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;h53SWWmMQUh4cLyBmYeNvw==&#34;: {&#xA;      &#34;id&#34;: &#34;h53SWWmMQUh4cLyBmYeNvw==&#34;,&#xA;      &#34;name&#34;: &#34;avahi-libs&#34;,&#xA;      &#34;version&#34;: &#34;0.7-27.el8_10.1&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;0.7-27.el8_10.1&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hSTTMcRX1DBcXc+8jKeg3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;hSTTMcRX1DBcXc+8jKeg3Q==&#34;,&#xA;      &#34;name&#34;: &#34;libgcc&#34;,&#xA;      &#34;version&#34;: &#34;8.5.0-28.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;8.5.0-28.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hcJqCsCpWm+XI9JT6ImS5g==&#34;: {&#xA;      &#34;id&#34;: &#34;hcJqCsCpWm+XI9JT6ImS5g==&#34;,&#xA;      &#34;name&#34;: &#34;nettle&#34;,&#xA;      &#34;version&#34;: &#34;3.4.1-7.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nettle&#34;,&#xA;        &#34;version&#34;: &#34;3.4.1-7.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;isPl2YxnCTfcLmUYH6Q0sA==&#34;: {&#xA;      &#34;id&#34;: &#34;isPl2YxnCTfcLmUYH6Q0sA==&#34;,&#xA;      &#34;name&#34;: &#34;libuuid&#34;,&#xA;      &#34;version&#34;: &#34;2.32.1-48.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;2.32.1-48.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;j5YRt82iOHry4ndSyCLgaA==&#34;: {&#xA;      &#34;id&#34;: &#34;j5YRt82iOHry4ndSyCLgaA==&#34;,&#xA;      &#34;name&#34;: &#34;cups-libs&#34;,&#xA;      &#34;version&#34;: &#34;1:2.2.6-67.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;2.2.6-67.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jSeaYCeiTMhbTniYmwK8dQ==&#34;: {&#xA;      &#34;id&#34;: &#34;jSeaYCeiTMhbTniYmwK8dQ==&#34;,&#xA;      &#34;name&#34;: &#34;python3-libs&#34;,&#xA;      &#34;version&#34;: &#34;3.6.8-75.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;3.6.8-75.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jmNxyfDM4IV/F4mrfNTfyg==&#34;: {&#xA;      &#34;id&#34;: &#34;jmNxyfDM4IV/F4mrfNTfyg==&#34;,&#xA;      &#34;name&#34;: &#34;setup&#34;,&#xA;      &#34;version&#34;: &#34;2.12.2-9.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;setup&#34;,&#xA;        &#34;version&#34;: &#34;2.12.2-9.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jtdCxL/eH5JTPcKstKunJg==&#34;: {&#xA;      &#34;id&#34;: &#34;jtdCxL/eH5JTPcKstKunJg==&#34;,&#xA;      &#34;name&#34;: &#34;grep&#34;,&#xA;      &#34;version&#34;: &#34;3.1-6.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;grep&#34;,&#xA;        &#34;version&#34;: &#34;3.1-6.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;k/BpvWmZ5EVfmiPqpZ3pGw==&#34;: {&#xA;      &#34;id&#34;: &#34;k/BpvWmZ5EVfmiPqpZ3pGw==&#34;,&#xA;      &#34;name&#34;: &#34;expat&#34;,&#xA;      &#34;version&#34;: &#34;2.5.0-1.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;2.5.0-1.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;k4gCNgIfg7MM/e42ThRx2w==&#34;: {&#xA;      &#34;id&#34;: &#34;k4gCNgIfg7MM/e42ThRx2w==&#34;,&#xA;      &#34;name&#34;: &#34;libzstd&#34;,&#xA;      &#34;version&#34;: &#34;1.4.4-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zstd&#34;,&#xA;        &#34;version&#34;: &#34;1.4.4-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ka4b0+TZOGmroTz/rrRQcg==&#34;: {&#xA;      &#34;id&#34;: &#34;ka4b0+TZOGmroTz/rrRQcg==&#34;,&#xA;      &#34;name&#34;: &#34;nss-softokn&#34;,&#xA;      &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nss&#34;,&#xA;        &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kwc9NYOQig+qWs5qmBRL/w==&#34;: {&#xA;      &#34;id&#34;: &#34;kwc9NYOQig+qWs5qmBRL/w==&#34;,&#xA;      &#34;name&#34;: &#34;ncurses-libs&#34;,&#xA;      &#34;version&#34;: &#34;6.1-10.20180224.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;6.1-10.20180224.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lEFbOzBTlWwCqC/ZbjJfgQ==&#34;: {&#xA;      &#34;id&#34;: &#34;lEFbOzBTlWwCqC/ZbjJfgQ==&#34;,&#xA;      &#34;name&#34;: &#34;python3-setuptools-wheel&#34;,&#xA;      &#34;version&#34;: &#34;39.2.0-9.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-setuptools&#34;,&#xA;        &#34;version&#34;: &#34;39.2.0-9.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;lU0MYRg2dg5wynl2dMGsgA==&#34;: {&#xA;      &#34;id&#34;: &#34;lU0MYRg2dg5wynl2dMGsgA==&#34;,&#xA;      &#34;name&#34;: &#34;xz-libs&#34;,&#xA;      &#34;version&#34;: &#34;5.2.4-4.el8_6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz&#34;,&#xA;        &#34;version&#34;: &#34;5.2.4-4.el8_6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mAmp7BtGrfzV0HnAKw9sTw==&#34;: {&#xA;      &#34;id&#34;: &#34;mAmp7BtGrfzV0HnAKw9sTw==&#34;,&#xA;      &#34;name&#34;: &#34;libsigsegv&#34;,&#xA;      &#34;version&#34;: &#34;2.11-5.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libsigsegv&#34;,&#xA;        &#34;version&#34;: &#34;2.11-5.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mLwCNKs2wEtLWAiibtR4BQ==&#34;: {&#xA;      &#34;id&#34;: &#34;mLwCNKs2wEtLWAiibtR4BQ==&#34;,&#xA;      &#34;name&#34;: &#34;microdnf&#34;,&#xA;      &#34;version&#34;: &#34;3.8.0-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;microdnf&#34;,&#xA;        &#34;version&#34;: &#34;3.8.0-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mkpeQMTn6iNiF+ShBe+oZg==&#34;: {&#xA;      &#34;id&#34;: &#34;mkpeQMTn6iNiF+ShBe+oZg==&#34;,&#xA;      &#34;name&#34;: &#34;libverto&#34;,&#xA;      &#34;version&#34;: &#34;0.3.2-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libverto&#34;,&#xA;        &#34;version&#34;: &#34;0.3.2-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mtrWxjnWyzrIFOuHVeUG6g==&#34;: {&#xA;      &#34;id&#34;: &#34;mtrWxjnWyzrIFOuHVeUG6g==&#34;,&#xA;      &#34;name&#34;: &#34;tar&#34;,&#xA;      &#34;version&#34;: &#34;2:1.30-11.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;1.30-11.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nDtLoMnkuhspYDn7NZEcjw==&#34;: {&#xA;      &#34;id&#34;: &#34;nDtLoMnkuhspYDn7NZEcjw==&#34;,&#xA;      &#34;name&#34;: &#34;findutils&#34;,&#xA;      &#34;version&#34;: &#34;1:4.6.0-24.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;findutils&#34;,&#xA;        &#34;version&#34;: &#34;4.6.0-24.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;o4v1nyEgxKUJdf78CSzLEg==&#34;: {&#xA;      &#34;id&#34;: &#34;o4v1nyEgxKUJdf78CSzLEg==&#34;,&#xA;      &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;      &#34;version&#34;: &#34;1.31-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgpg-error&#34;,&#xA;        &#34;version&#34;: &#34;1.31-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;oPxhGBL0xk+N4XwwxvflAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;oPxhGBL0xk+N4XwwxvflAQ==&#34;,&#xA;      &#34;name&#34;: &#34;redhat-release&#34;,&#xA;      &#34;version&#34;: &#34;8.10-0.3.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;redhat-release&#34;,&#xA;        &#34;version&#34;: &#34;8.10-0.3.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;oSDtB9GflLljTYeOAikyIQ==&#34;: {&#xA;      &#34;id&#34;: &#34;oSDtB9GflLljTYeOAikyIQ==&#34;,&#xA;      &#34;name&#34;: &#34;glib2&#34;,&#xA;      &#34;version&#34;: &#34;2.56.4-168.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;2.56.4-168.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;p9tXHgTBVU/b3sTnwfubzg==&#34;: {&#xA;      &#34;id&#34;: &#34;p9tXHgTBVU/b3sTnwfubzg==&#34;,&#xA;      &#34;name&#34;: &#34;libdb-utils&#34;,&#xA;      &#34;version&#34;: &#34;5.3.28-42.el8_4&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libdb&#34;,&#xA;        &#34;version&#34;: &#34;5.3.28-42.el8_4&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pY2NT/GP1UxyOuAl2rKgCw==&#34;: {&#xA;      &#34;id&#34;: &#34;pY2NT/GP1UxyOuAl2rKgCw==&#34;,&#xA;      &#34;name&#34;: &#34;npth&#34;,&#xA;      &#34;version&#34;: &#34;1.5-4.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;npth&#34;,&#xA;        &#34;version&#34;: &#34;1.5-4.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;peUaHHW4E9Y6Nd8+gJR5cQ==&#34;: {&#xA;      &#34;id&#34;: &#34;peUaHHW4E9Y6Nd8+gJR5cQ==&#34;,&#xA;      &#34;name&#34;: &#34;libssh-config&#34;,&#xA;      &#34;version&#34;: &#34;0.9.6-16.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;0.9.6-16.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pp9zZ0tBoevZ/s15eFRL8g==&#34;: {&#xA;      &#34;id&#34;: &#34;pp9zZ0tBoevZ/s15eFRL8g==&#34;,&#xA;      &#34;name&#34;: &#34;libacl&#34;,&#xA;      &#34;version&#34;: &#34;2.2.53-3.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;acl&#34;,&#xA;        &#34;version&#34;: &#34;2.2.53-3.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;q4X/5GGPJSNoqWY61ewdVA==&#34;: {&#xA;      &#34;id&#34;: &#34;q4X/5GGPJSNoqWY61ewdVA==&#34;,&#xA;      &#34;name&#34;: &#34;tzdata-java&#34;,&#xA;      &#34;version&#34;: &#34;2026a-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tzdata&#34;,&#xA;        &#34;version&#34;: &#34;2026a-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;r23nOnTJvuvXzj0P21ldlw==&#34;: {&#xA;      &#34;id&#34;: &#34;r23nOnTJvuvXzj0P21ldlw==&#34;,&#xA;      &#34;name&#34;: &#34;rpm-libs&#34;,&#xA;      &#34;version&#34;: &#34;4.14.3-32.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;rpm&#34;,&#xA;        &#34;version&#34;: &#34;4.14.3-32.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rFsA2fU/SFo3JGOkxRURTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rFsA2fU/SFo3JGOkxRURTQ==&#34;,&#xA;      &#34;name&#34;: &#34;keyutils-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.5.10-9.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;keyutils&#34;,&#xA;        &#34;version&#34;: &#34;1.5.10-9.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sMrsZHOrW8FfprPHZo6Jww==&#34;: {&#xA;      &#34;id&#34;: &#34;sMrsZHOrW8FfprPHZo6Jww==&#34;,&#xA;      &#34;name&#34;: &#34;libmodulemd&#34;,&#xA;      &#34;version&#34;: &#34;2.13.0-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libmodulemd&#34;,&#xA;        &#34;version&#34;: &#34;2.13.0-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sUhkiUesE2DHTU1IF7t+tw==&#34;: {&#xA;      &#34;id&#34;: &#34;sUhkiUesE2DHTU1IF7t+tw==&#34;,&#xA;      &#34;name&#34;: &#34;platform-python-setuptools&#34;,&#xA;      &#34;version&#34;: &#34;39.2.0-9.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-setuptools&#34;,&#xA;        &#34;version&#34;: &#34;39.2.0-9.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;trIX86+UkjuJsaeYfHvnYw==&#34;: {&#xA;      &#34;id&#34;: &#34;trIX86+UkjuJsaeYfHvnYw==&#34;,&#xA;      &#34;name&#34;: &#34;libnghttp2&#34;,&#xA;      &#34;version&#34;: &#34;1.33.0-6.el8_10.2&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nghttp2&#34;,&#xA;        &#34;version&#34;: &#34;1.33.0-6.el8_10.2&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u25cfo+Wn6RpzVY/kgcoGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;u25cfo+Wn6RpzVY/kgcoGQ==&#34;,&#xA;      &#34;name&#34;: &#34;lksctp-tools&#34;,&#xA;      &#34;version&#34;: &#34;1.0.18-3.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lksctp-tools&#34;,&#xA;        &#34;version&#34;: &#34;1.0.18-3.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uAJuv5cA4XPhcDfjrdFI9w==&#34;: {&#xA;      &#34;id&#34;: &#34;uAJuv5cA4XPhcDfjrdFI9w==&#34;,&#xA;      &#34;name&#34;: &#34;javapackages-filesystem&#34;,&#xA;      &#34;version&#34;: &#34;5.3.0-1.module+el8+2447+6f56d9a6&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;javapackages-tools&#34;,&#xA;        &#34;version&#34;: &#34;5.3.0-1.module+el8+2447+6f56d9a6&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;module&#34;: &#34;javapackages-runtime:201801&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;module&#34;: &#34;javapackages-runtime:201801&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uCw7c1p0VzVV36rFL2/j4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;uCw7c1p0VzVV36rFL2/j4Q==&#34;,&#xA;      &#34;name&#34;: &#34;bzip2-libs&#34;,&#xA;      &#34;version&#34;: &#34;1.0.6-28.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;bzip2&#34;,&#xA;        &#34;version&#34;: &#34;1.0.6-28.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;v/KoDsdxOHqLHd7du8yyWQ==&#34;: {&#xA;      &#34;id&#34;: &#34;v/KoDsdxOHqLHd7du8yyWQ==&#34;,&#xA;      &#34;name&#34;: &#34;lua-libs&#34;,&#xA;      &#34;version&#34;: &#34;5.3.4-12.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lua&#34;,&#xA;        &#34;version&#34;: &#34;5.3.4-12.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;v4V8PzD9YS+9p+1g+BPsfA==&#34;: {&#xA;      &#34;id&#34;: &#34;v4V8PzD9YS+9p+1g+BPsfA==&#34;,&#xA;      &#34;name&#34;: &#34;ubi8/openjdk-17-runtime&#34;,&#xA;      &#34;version&#34;: &#34;1.23-4.1776047406&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;JvPeDbC4IianXNphFOy9jw==&#34;,&#xA;        &#34;name&#34;: &#34;openjdk-17-runtime-ubi8-container&#34;,&#xA;        &#34;version&#34;: &#34;1.23-4.1776047406&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;source&#34;: {&#xA;          &#34;id&#34;: &#34;&#34;,&#xA;          &#34;name&#34;: &#34;&#34;,&#xA;          &#34;version&#34;: &#34;&#34;,&#xA;          &#34;normalized_version&#34;: &#34;&#34;,&#xA;          &#34;cpe&#34;: &#34;&#34;&#xA;        },&#xA;        &#34;normalized_version&#34;: &#34;rhctag:1.23.0.0.0.0.0.0.0.0&#34;,&#xA;        &#34;arch&#34;: &#34;x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;rhctag:1.23.0.0.0.0.0.0.0.0&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wQToP4WURQ4/A8LQU1k5kA==&#34;: {&#xA;      &#34;id&#34;: &#34;wQToP4WURQ4/A8LQU1k5kA==&#34;,&#xA;      &#34;name&#34;: &#34;langpacks-en&#34;,&#xA;      &#34;version&#34;: &#34;1.0-12.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;langpacks&#34;,&#xA;        &#34;version&#34;: &#34;1.0-12.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wiX2z3C4urSDsP+bIajgNg==&#34;: {&#xA;      &#34;id&#34;: &#34;wiX2z3C4urSDsP+bIajgNg==&#34;,&#xA;      &#34;name&#34;: &#34;io.github.stuartwdouglas.hacbs-test.shaded:shaded-jdk11&#34;,&#xA;      &#34;version&#34;: &#34;1.9&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wpJmhjYJz5TYuh0mbRPs4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;wpJmhjYJz5TYuh0mbRPs4Q==&#34;,&#xA;      &#34;name&#34;: &#34;info&#34;,&#xA;      &#34;version&#34;: &#34;6.5-7.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;texinfo&#34;,&#xA;        &#34;version&#34;: &#34;6.5-7.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xDLbw0lNdZ2pSj9R8k9t6A==&#34;: {&#xA;      &#34;id&#34;: &#34;xDLbw0lNdZ2pSj9R8k9t6A==&#34;,&#xA;      &#34;name&#34;: &#34;copy-jdk-configs&#34;,&#xA;      &#34;version&#34;: &#34;4.0-2.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;copy-jdk-configs&#34;,&#xA;        &#34;version&#34;: &#34;4.0-2.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;noarch&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xTF9l16G3x26txeCsO9Bug==&#34;: {&#xA;      &#34;id&#34;: &#34;xTF9l16G3x26txeCsO9Bug==&#34;,&#xA;      &#34;name&#34;: &#34;json-glib&#34;,&#xA;      &#34;version&#34;: &#34;1.4.4-1.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;json-glib&#34;,&#xA;        &#34;version&#34;: &#34;1.4.4-1.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xY/gcEds28iVWCynxOCw9g==&#34;: {&#xA;      &#34;id&#34;: &#34;xY/gcEds28iVWCynxOCw9g==&#34;,&#xA;      &#34;name&#34;: &#34;libcom_err&#34;,&#xA;      &#34;version&#34;: &#34;1.45.6-7.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;e2fsprogs&#34;,&#xA;        &#34;version&#34;: &#34;1.45.6-7.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xvIYCTeML23osZxD1kFItQ==&#34;: {&#xA;      &#34;id&#34;: &#34;xvIYCTeML23osZxD1kFItQ==&#34;,&#xA;      &#34;name&#34;: &#34;lua&#34;,&#xA;      &#34;version&#34;: &#34;5.3.4-12.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;lua&#34;,&#xA;        &#34;version&#34;: &#34;5.3.4-12.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;y1KXv1Wa0o6q+5/jJ4FmmA==&#34;: {&#xA;      &#34;id&#34;: &#34;y1KXv1Wa0o6q+5/jJ4FmmA==&#34;,&#xA;      &#34;name&#34;: &#34;libxml2&#34;,&#xA;      &#34;version&#34;: &#34;2.9.7-21.el8_10.3&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;2.9.7-21.el8_10.3&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yI01txXPQZENPfjF45L+Zw==&#34;: {&#xA;      &#34;id&#34;: &#34;yI01txXPQZENPfjF45L+Zw==&#34;,&#xA;      &#34;name&#34;: &#34;nss-sysinit&#34;,&#xA;      &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nss&#34;,&#xA;        &#34;version&#34;: &#34;3.112.0-4.el8_10&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yX08xXm2MSxk7s6Ui2Z6BQ==&#34;: {&#xA;      &#34;id&#34;: &#34;yX08xXm2MSxk7s6Ui2Z6BQ==&#34;,&#xA;      &#34;name&#34;: &#34;systemd-libs&#34;,&#xA;      &#34;version&#34;: &#34;239-82.el8_10.15&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;239-82.el8_10.15&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zAReYdYoHUkp8wr8i3SW2g==&#34;: {&#xA;      &#34;id&#34;: &#34;zAReYdYoHUkp8wr8i3SW2g==&#34;,&#xA;      &#34;name&#34;: &#34;libffi&#34;,&#xA;      &#34;version&#34;: &#34;3.1-24.el8&#34;,&#xA;      &#34;kind&#34;: &#34;binary&#34;,&#xA;      &#34;source&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libffi&#34;,&#xA;        &#34;version&#34;: &#34;3.1-24.el8&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;normalized_version&#34;: &#34;&#34;,&#xA;      &#34;arch&#34;: &#34;x86_64&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;distributions&#34;: {&#xA;    &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;: {&#xA;      &#34;id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;      &#34;did&#34;: &#34;rhel&#34;,&#xA;      &#34;name&#34;: &#34;Red Hat Enterprise Linux Server&#34;,&#xA;      &#34;version&#34;: &#34;8&#34;,&#xA;      &#34;version_code_name&#34;: &#34;&#34;,&#xA;      &#34;version_id&#34;: &#34;8&#34;,&#xA;      &#34;arch&#34;: &#34;&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;      &#34;pretty_name&#34;: &#34;Red Hat Enterprise Linux Server 8&#34;&#xA;    }&#xA;  },&#xA;  &#34;repository&#34;: {&#xA;    &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;: {&#xA;      &#34;id&#34;: &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/a:redhat:enterprise_linux:8::appstream&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:8:*:appstream:*:*:*:*:*&#34;&#xA;    },&#xA;    &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;: {&#xA;      &#34;id&#34;: &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/o:redhat:enterprise_linux:8::baseos&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:baseos:*:*:*:*:*&#34;&#xA;    },&#xA;    &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;: {&#xA;      &#34;id&#34;: &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/a:redhat:enterprise_linux:8::appstream&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:a:redhat:enterprise_linux:8:*:appstream:*:*:*:*:*&#34;&#xA;    },&#xA;    &#34;d3216d8b-09f6-4149-9a37-cc012146e403&#34;: {&#xA;      &#34;id&#34;: &#34;d3216d8b-09f6-4149-9a37-cc012146e403&#34;,&#xA;      &#34;name&#34;: &#34;Red Hat Container Catalog&#34;,&#xA;      &#34;uri&#34;: &#34;https://catalog.redhat.com/software/containers/explore&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;: {&#xA;      &#34;id&#34;: &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;      &#34;name&#34;: &#34;cpe:/o:redhat:enterprise_linux:8::baseos&#34;,&#xA;      &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;      &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:baseos:*:*:*:*:*&#34;&#xA;    },&#xA;    &#34;f9e07276-1e52-4af7-91c5-aea136805162&#34;: {&#xA;      &#34;id&#34;: &#34;f9e07276-1e52-4af7-91c5-aea136805162&#34;,&#xA;      &#34;name&#34;: &#34;maven&#34;,&#xA;      &#34;uri&#34;: &#34;https://repo1.maven.apache.org/maven2&#34;,&#xA;      &#34;cpe&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;environments&#34;: {&#xA;    &#34;+XM+s3niWaEk1U5jnR5DpA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;+Xr7HyTxXf0c8jLaUyo3xA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;+hvIC0Et/RtHi7EAFCmfEw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;+qrxjVH7Im8eBfrz4h4P/w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;/ji9IJ9FfNcwqVRbMWZshQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;0+9x6aIRcNDCM7R94cpzew==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;1gormAsAjMuks2JveQRd0Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;22yBCZl99yVP86UHT7jTdw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;2PBlaOceApWEi634ZUHO/g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;3+d+oaGDGj9g2+1RFZjY5A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;3OVNevSm98h4f1fmX4IZwQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;maven:deployments/hacbs-test.jar&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1259408a0a2871c51e403e1a21beceac1a43f23eb316c58c28a20d4023d8611a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f9e07276-1e52-4af7-91c5-aea136805162&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;3jI2apoRMNGhHa141Q5dlQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;3uSX4NgBxQvC8LEk48QoOQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;45rvgYmy022Tx6fVWfking==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;47OMpR7yEmE4lttsyWq3fw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;4ZgMXaHDWnwPnqKlcJzEIw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;4flTdmUV4iK1Ax+LXJm8qQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;4sG4bBloak5Sz907ZDRs6Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;4uQuJg+li+gGAwnGRDcs+w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;5U8sNbKx0xZsaHcVt4MmxA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;67DLnC895xbDFuD3MGhCtQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;maven:deployments/hacbs-test.jar&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1259408a0a2871c51e403e1a21beceac1a43f23eb316c58c28a20d4023d8611a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f9e07276-1e52-4af7-91c5-aea136805162&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;6KnijwRsfeerWmf5Zl8NWw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;7eg89eCgA75bJ7WhhN/T4Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;9uhqFNTCJ7/bpzSlc7qCaQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;AIs6pmCup5N9+6Ag6e2/og==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;AuC6XQzcU/5tB4luIfjLFg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;AziZ1oGI+oDXVPzldKNj+w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;BPsD0kkdIoK3KQUZ5DpJjw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;BmK1zIjr5KsuOODCYwxRCw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;CbqHQON08ZsUvPS9XDaTFA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Cklbj7Y2kf3vqxqc0m1GHQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;D/ASdBsgxLNlG5Q8U7UPsQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;D9iJYSwBt2n6JCuuNo2fKg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;DV119Dw0W4RdsbJkdoHU9w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;DgyhtZBcSIlVmY6xC8s1mA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;EGfzPeF6a5hj9x4BwoN25A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;EiNiLT8ulizCzEWcybhizQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;F7AOP7tK5AfUXV1g9iTzFA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;FS5/DAbDsXWURU9onlACPA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;G+gX+j4AbiCorxKiF1UojA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;GLKhGblbPbPbtDKwfpCv5A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Gg1Q6hponuT1eSJHwaJ83w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;HMIoZ/TKrKhxI1rD26qmpw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;IzLcxZDtcvtJR5Gwdq9HDg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;J34PJ2GThOWZuKVgFIoieA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;JNDNKhJbFTSevs7EALfE9A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;JvPeDbC4IianXNphFOy9jw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;root/buildinfo/Dockerfile-ubi8-openjdk-17-runtime-1.23-4.1776047406&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;d3216d8b-09f6-4149-9a37-cc012146e403&#34;,&#xA;          &#34;d3216d8b-09f6-4149-9a37-cc012146e403&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;LXiVkIlXLq/usMYIwCTH8Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;LkoLKEri5dIAb0vFMkSOag==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;N1RbIRo2SyHosQefv+skDw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;N3ZaMrNJKoumMpaY0smlMQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;N5EuVcX6TPHBo7OPtax5uA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;NJbhst8VIOwst++ZzRP6tA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;NguWV8S6YQYvQsGQDJm2Rg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;NsvPyDc//39XTuXcn3j2uQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ORsDK2A5479NPB0r01PoXQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;P5Se4zJpr8ZUwZNUojfuzA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;POPH5BJ/Q4Bfen05TT291g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Q0uPb/t/3IQ8GEwlv/J3Cw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;QC6e3OaV78mjs678tGU2KQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;QXEDMSZisv5SUXtJo7Fs5g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;RKXYZTbYgViwzC05uqeDSg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;maven:deployments/hacbs-test.jar&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1259408a0a2871c51e403e1a21beceac1a43f23eb316c58c28a20d4023d8611a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f9e07276-1e52-4af7-91c5-aea136805162&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;RRWuvyUdhwGbBo2a/Ra1hw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;RtrzwDgrQgu9S5B72s2sww==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;TARQvmsLVC/S1fQD1jO4Xw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;U3ZkYu9FoEzQITrVBlQtLA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;USWNn71p+k059dbiu5HDEA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;UUZyda9G/ffvF6rJ5W1UnQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Vax934M9zGbzjdT3Y/XU9w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;VrCmPwuY69qW5jl9ctxOZg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;W66WOQ3v6r7mSn6+o7gaew==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Wq1n4jzKBPdL9z5l5HD99w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;YjDcGmvP0/z8VqRiUvkhOQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;Za0y7YiKRidyIBZNIzq/Ng==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ar0do80Wlk1FaVvtx66g6Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;auI8KtI6OozP7EAIr9UlQQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;bWUdPEYmtshwdmuX5VapfQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;bmxL3lydQy0yU8g1iBgovg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;cXCMP7NdkMDf1+Rb1IEktQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;dOBT1Qffq44NOVuk9chDyg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;dOwQwVL1NxmF6ouACZklrQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;dSjxsaDISLUiFwRTCSO8Tg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;dtGaxafuhIU1Ppty914fJw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;eZ7CwFvwDCQu4vzKyuIZgA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;f/Al/eNlUhjEgKSV0J2z7w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;f1lteJj1IxLDbDb+BI8yjg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;g146nKetkX1f4hfH1b5RWA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;gMqsUnRclTj6iuxHCslNRA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;gOaN4treTmKK7tU+N6AZ1w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;gtbMsmX05ZWh+bkM1Wprlw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;h53SWWmMQUh4cLyBmYeNvw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;hSTTMcRX1DBcXc+8jKeg3Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;hcJqCsCpWm+XI9JT6ImS5g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;isPl2YxnCTfcLmUYH6Q0sA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;j5YRt82iOHry4ndSyCLgaA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;jSeaYCeiTMhbTniYmwK8dQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;jmNxyfDM4IV/F4mrfNTfyg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;jtdCxL/eH5JTPcKstKunJg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;k/BpvWmZ5EVfmiPqpZ3pGw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;k4gCNgIfg7MM/e42ThRx2w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;ka4b0+TZOGmroTz/rrRQcg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;kwc9NYOQig+qWs5qmBRL/w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;lEFbOzBTlWwCqC/ZbjJfgQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;lU0MYRg2dg5wynl2dMGsgA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;mAmp7BtGrfzV0HnAKw9sTw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;mLwCNKs2wEtLWAiibtR4BQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;mkpeQMTn6iNiF+ShBe+oZg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;mtrWxjnWyzrIFOuHVeUG6g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;nDtLoMnkuhspYDn7NZEcjw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;o4v1nyEgxKUJdf78CSzLEg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;oPxhGBL0xk+N4XwwxvflAQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;oSDtB9GflLljTYeOAikyIQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;p9tXHgTBVU/b3sTnwfubzg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;pY2NT/GP1UxyOuAl2rKgCw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;peUaHHW4E9Y6Nd8+gJR5cQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;pp9zZ0tBoevZ/s15eFRL8g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;q4X/5GGPJSNoqWY61ewdVA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;r23nOnTJvuvXzj0P21ldlw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;rFsA2fU/SFo3JGOkxRURTQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;sMrsZHOrW8FfprPHZo6Jww==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;sUhkiUesE2DHTU1IF7t+tw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;trIX86+UkjuJsaeYfHvnYw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;u25cfo+Wn6RpzVY/kgcoGQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;uAJuv5cA4XPhcDfjrdFI9w==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;uCw7c1p0VzVV36rFL2/j4Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;v/KoDsdxOHqLHd7du8yyWQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;v4V8PzD9YS+9p+1g+BPsfA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;root/buildinfo/Dockerfile-ubi8-openjdk-17-runtime-1.23-4.1776047406&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;d3216d8b-09f6-4149-9a37-cc012146e403&#34;,&#xA;          &#34;d3216d8b-09f6-4149-9a37-cc012146e403&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;wQToP4WURQ4/A8LQU1k5kA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;wiX2z3C4urSDsP+bIajgNg==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;maven:deployments/hacbs-test.jar&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:1259408a0a2871c51e403e1a21beceac1a43f23eb316c58c28a20d4023d8611a&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;f9e07276-1e52-4af7-91c5-aea136805162&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;wpJmhjYJz5TYuh0mbRPs4Q==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;xDLbw0lNdZ2pSj9R8k9t6A==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;xTF9l16G3x26txeCsO9Bug==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;xY/gcEds28iVWCynxOCw9g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;xvIYCTeML23osZxD1kFItQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;y1KXv1Wa0o6q+5/jJ4FmmA==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;yI01txXPQZENPfjF45L+Zw==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:8d3eef592277c4f368304d2f9988a04513f3a3cf21a0cfdf9f0722a7e9faa2a2&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;eb9883d1-cc50-4e50-8135-aa87341fc643&#34;,&#xA;          &#34;6f0fdba0-1fb4-41e3-8c1e-af2473051444&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;yX08xXm2MSxk7s6Ui2Z6BQ==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ],&#xA;    &#34;zAReYdYoHUkp8wr8i3SW2g==&#34;: [&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;&#34;,&#xA;        &#34;repository_ids&#34;: null&#xA;      },&#xA;      {&#xA;        &#34;package_db&#34;: &#34;bdb:var/lib/rpm&#34;,&#xA;        &#34;introduced_in&#34;: &#34;sha256:aa62cc7304168fb37d0a24f7004a5509bd1eecc1789c65820c866eb23792edcd&#34;,&#xA;        &#34;distribution_id&#34;: &#34;76d24b18-4451-446c-90e0-8416e713e4e3&#34;,&#xA;        &#34;repository_ids&#34;: [&#xA;          &#34;24786b2f-2bbc-4492-807a-ede084e208c9&#34;,&#xA;          &#34;3fdc4797-fd66-487e-949f-89714b333c7e&#34;&#xA;        ]&#xA;      }&#xA;    ]&#xA;  },&#xA;  &#34;vulnerabilities&#34;: {&#xA;    &#34;+nHq7dak7Hkjcru/xpwzhQ==&#34;: {&#xA;      &#34;id&#34;: &#34;+nHq7dak7Hkjcru/xpwzhQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-12413&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Mozilla nss. A raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman(DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The highest threat from this vulnerability is to data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-09-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-12413 https://bugzilla.redhat.com/show_bug.cgi?id=1877557 https://www.cve.org/CVERecord?id=CVE-2020-12413 https://nvd.nist.gov/vuln/detail/CVE-2020-12413 https://raccoon-attack.com/RacoonAttack.pdf https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-12413.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nss&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/1CYFiexnJcM7p4YrI/FVg==&#34;: {&#xA;      &#34;id&#34;: &#34;/1CYFiexnJcM7p4YrI/FVg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4504&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in CUPS and libppd, where a failure to validate the length provided in an attacker-crafted PPD PostScript document can lead to a heap-based buffer overflow, causing a denial of service or, in some cases, execute arbitrary code, depending on how the application processes untrusted PPD files.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-09-20T12:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4504 https://bugzilla.redhat.com/show_bug.cgi?id=2238509 https://www.cve.org/CVERecord?id=CVE-2023-4504 https://nvd.nist.gov/vuln/detail/CVE-2023-4504 https://takeonme.org/cves/CVE-2023-4504.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4504.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;/QaL/BUIdoF2MAB/C1YiGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;/QaL/BUIdoF2MAB/C1YiGQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4424&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4424 https://bugzilla.redhat.com/show_bug.cgi?id=2449006 https://www.cve.org/CVERecord?id=CVE-2026-4424 https://nvd.nist.gov/vuln/detail/CVE-2026-4424 https://github.com/libarchive/libarchive/pull/2898 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4424.json https://access.redhat.com/errata/RHSA-2026:8534&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.3.3-7.el8_10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;0QzoXQSqkKieJ7Oc+px0JA==&#34;: {&#xA;      &#34;id&#34;: &#34;0QzoXQSqkKieJ7Oc+px0JA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13837&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the plistlib module in the Python standard library. The amount of data to read from a Plist file is specified in the file itself. This issue allows a specially crafted Plist file to cause an application to allocate a large amount of memory, potentially resulting in allocations errors, swapping, out-of-memory conditions or even system freezes.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-01T18:13:32Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13837 https://bugzilla.redhat.com/show_bug.cgi?id=2418084 https://www.cve.org/CVERecord?id=CVE-2025-13837 https://nvd.nist.gov/vuln/detail/CVE-2025-13837 https://github.com/python/cpython/issues/119342 https://github.com/python/cpython/pull/119343 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13837.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0WTD6ZUY2Zj2w0R3oyPWRw==&#34;: {&#xA;      &#34;id&#34;: &#34;0WTD6ZUY2Zj2w0R3oyPWRw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34980&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenPrinting CUPS. An unauthorized client can exploit this vulnerability by sending a specially crafted print job to a shared PostScript queue without authentication. The server improperly handles the `page-border` value, allowing an attacker to embed and reparse malicious text as a trusted scheduler control record. This can lead to arbitrary code execution with the privileges of the &#39;lp&#39; user, potentially compromising the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-03T21:18:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34980 https://bugzilla.redhat.com/show_bug.cgi?id=2454954 https://www.cve.org/CVERecord?id=CVE-2026-34980 https://nvd.nist.gov/vuln/detail/CVE-2026-34980 https://github.com/OpenPrinting/cups/security/advisories/GHSA-4852-v58g-6cwf https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34980.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0fCtWwB6iclgRvIA+IqiJQ==&#34;: {&#xA;      &#34;id&#34;: &#34;0fCtWwB6iclgRvIA+IqiJQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1484&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1484 https://bugzilla.redhat.com/show_bug.cgi?id=2433259 https://www.cve.org/CVERecord?id=CVE-2026-1484 https://nvd.nist.gov/vuln/detail/CVE-2026-1484 https://gitlab.gnome.org/GNOME/glib/-/issues/3870 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1484.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;0nQ3GJDLY22M176Z5ESg6A==&#34;: {&#xA;      &#34;id&#34;: &#34;0nQ3GJDLY22M176Z5ESg6A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68972&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. An adversary can exploit this vulnerability by crafting a signed message that includes a form feed character (\\f) at the end of a plaintext line. This allows the adversary to append additional, unsigned text to the message while the signature verification still reports success. This issue leads to an integrity bypass, potentially enabling the spoofing of signed communications.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-27T22:52:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68972 https://bugzilla.redhat.com/show_bug.cgi?id=2425646 https://www.cve.org/CVERecord?id=CVE-2025-68972 https://nvd.nist.gov/vuln/detail/CVE-2025-68972 https://gpg.fail/formfeed https://news.ycombinator.com/item?id=46404339 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68972.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1lUHOMB3ANHGWpqCBv9Ynw==&#34;: {&#xA;      &#34;id&#34;: &#34;1lUHOMB3ANHGWpqCBv9Ynw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4105&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4105 https://bugzilla.redhat.com/show_bug.cgi?id=2447262 https://www.cve.org/CVERecord?id=CVE-2026-4105 https://nvd.nist.gov/vuln/detail/CVE-2026-4105 https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4105.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;1vG4ZYIu07BTj9XJ+a+P9Q==&#34;: {&#xA;      &#34;id&#34;: &#34;1vG4ZYIu07BTj9XJ+a+P9Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27171&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in zlib. An attacker providing specially crafted input to the `crc32_combine64` or `crc32_combine_gen64` functions could trigger an infinite loop within the `x2nmodp` function. This leads to excessive CPU consumption, which can result in a Denial of Service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-18T02:36:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27171 https://bugzilla.redhat.com/show_bug.cgi?id=2440530 https://www.cve.org/CVERecord?id=CVE-2026-27171 https://nvd.nist.gov/vuln/detail/CVE-2026-27171 https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/ https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf https://github.com/madler/zlib/issues/904 https://github.com/madler/zlib/releases/tag/v1.3.2 https://ostif.org/zlib-audit-complete/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27171.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;29qrZyz+fmdn9Nzjpl2/Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;29qrZyz+fmdn9Nzjpl2/Pg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22693&#34;,&#xA;      &#34;description&#34;: &#34;A null pointer dereference vector has been discovered in the harfbuzz package. A null pointer dereference vulnerability exists in the SubtableUnicodesCache::create function located in src/hb-ot-cmap-table.hh:1672-1673. The function fails to check if hb_malloc returns NULL before using placement new to construct an object at the returned pointer address. When hb_malloc fails to allocate memory (which can occur in low-memory conditions or when using custom allocators that simulate allocation failures), it returns NULL. The code then attempts to call the constructor on this null pointer using placement new syntax, resulting in undefined behavior and a Segmentation Fault.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-10T05:53:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22693 https://bugzilla.redhat.com/show_bug.cgi?id=2428439 https://www.cve.org/CVERecord?id=CVE-2026-22693 https://nvd.nist.gov/vuln/detail/CVE-2026-22693 https://github.com/harfbuzz/harfbuzz/commit/1265ff8d990284f04d8768f35b0e20ae5f60daae https://github.com/harfbuzz/harfbuzz/security/advisories/GHSA-xvjr-f2r9-c7ww https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22693.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;2U8ppg+02PjFDuM5YqFstQ==&#34;: {&#xA;      &#34;id&#34;: &#34;2U8ppg+02PjFDuM5YqFstQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15282&#34;,&#xA;      &#34;description&#34;: &#34;Missing newline filtering has been discovered in Python. User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:35:13Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15282 https://bugzilla.redhat.com/show_bug.cgi?id=2431366 https://www.cve.org/CVERecord?id=CVE-2025-15282 https://nvd.nist.gov/vuln/detail/CVE-2025-15282 https://github.com/python/cpython/issues/143925 https://github.com/python/cpython/pull/143926 https://mail.python.org/archives/list/security-announce@python.org/thread/X66HL7SISGJT33J53OHXMZT4DFLMHVKF/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15282.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3IgZDz5UYkhu/U1/4kSWKg==&#34;: {&#xA;      &#34;id&#34;: &#34;3IgZDz5UYkhu/U1/4kSWKg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-25317&#34;,&#xA;      &#34;description&#34;: &#34;It was found that some Linux vendors may assign the ownership of the /var/log/cups directory to the `lp` user. This could allow an attacker with such privileges to create empty files in arbitrary locations, or to force arbitrary files to be opened and closed, using a symlink attack. This has a low impact on the integrity of the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-04-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-25317 https://bugzilla.redhat.com/show_bug.cgi?id=1949119 https://www.cve.org/CVERecord?id=CVE-2021-25317 https://nvd.nist.gov/vuln/detail/CVE-2021-25317 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-25317.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;3O4IzHXnRQMZXCe1gYATvw==&#34;: {&#xA;      &#34;id&#34;: &#34;3O4IzHXnRQMZXCe1gYATvw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22185&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenLDAP Lightning Memory-Mapped Database (LMDB) mdb_load. When processing malformed input, a local attacker can exploit a heap buffer underflow vulnerability in the readline() function. This can lead to an out-of-bounds read, potentially causing a denial of service (DoS) and limited disclosure of heap memory contents.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T20:26:30Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22185 https://bugzilla.redhat.com/show_bug.cgi?id=2427679 https://www.cve.org/CVERecord?id=CVE-2026-22185 https://nvd.nist.gov/vuln/detail/CVE-2026-22185 https://seclists.org/fulldisclosure/2026/Jan/5 https://seclists.org/fulldisclosure/2026/Jan/8 https://www.openldap.org/ https://www.vulncheck.com/advisories/openldap-lmdb-mdb-load-heap-buffer-underflow-in-readline https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22185.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openldap&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;4/mftydHpy90Umw3G0mTuQ==&#34;: {&#xA;      &#34;id&#34;: &#34;4/mftydHpy90Umw3G0mTuQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-1000879&#34;,&#xA;      &#34;description&#34;: &#34;libarchive version commit 379867ecb330b3a952fb7bfa7bffb7bbd5547205 onwards (release v3.3.0 onwards) contains a CWE-476: NULL Pointer Dereference vulnerability in ACL parser - libarchive/archive_acl.c, archive_acl_from_text_l() that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted archive file.&#34;,&#xA;      &#34;issued&#34;: &#34;2018-11-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2018-1000879 https://bugzilla.redhat.com/show_bug.cgi?id=1663890 https://www.cve.org/CVERecord?id=CVE-2018-1000879 https://nvd.nist.gov/vuln/detail/CVE-2018-1000879 https://security.access.redhat.com/data/csaf/v2/vex/2018/cve-2018-1000879.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5B1tQ2BK8z/YjRkYcvwqag==&#34;: {&#xA;      &#34;id&#34;: &#34;5B1tQ2BK8z/YjRkYcvwqag==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-19244&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the way SQLite handled certain types of SQL queries using DISTINCT, OVER and ORDER BY clauses. A remote attacker could exploit this flaw by providing a malicious SQL query that, when processed by an application linked to SQLite, would crash the application causing a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-11-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-19244 https://bugzilla.redhat.com/show_bug.cgi?id=1777945 https://www.cve.org/CVERecord?id=CVE-2019-19244 https://nvd.nist.gov/vuln/detail/CVE-2019-19244 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-19244.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;5ZHvcDYhgzWjwNpRgF2u1w==&#34;: {&#xA;      &#34;id&#34;: &#34;5ZHvcDYhgzWjwNpRgF2u1w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. When a separating comma ends up on a folded line during an address list folding of email headers, the comma is unintentionally unicode encoded. The expected behavior is that the separating comma remains unencoded. This can result in the address header being misinterpreted by some mail servers.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-28T18:59:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1795 https://bugzilla.redhat.com/show_bug.cgi?id=2349061 https://www.cve.org/CVERecord?id=CVE-2025-1795 https://nvd.nist.gov/vuln/detail/CVE-2025-1795 https://github.com/python/cpython/commit/09fab93c3d857496c0bd162797fab816c311ee48 https://github.com/python/cpython/commit/70754d21c288535e86070ca7a6e90dcb670b8593 https://github.com/python/cpython/commit/9148b77e0af91cdacaa7fe3dfac09635c3fe9a74 https://github.com/python/cpython/issues/100884 https://github.com/python/cpython/pull/100885 https://github.com/python/cpython/pull/119099 https://mail.python.org/archives/list/security-announce@python.org/thread/MB62IZMEC3UM6SGHP5LET5JX2Y7H4ZUR/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1795.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;673FKazcUiydbfN5c6amaw==&#34;: {&#xA;      &#34;id&#34;: &#34;673FKazcUiydbfN5c6amaw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-19190&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in the ncurses library. This issue occurs when processing a crafted terminfo database, causing a heap-based buffer overflow, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-05-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-19190 https://bugzilla.redhat.com/show_bug.cgi?id=2234923 https://www.cve.org/CVERecord?id=CVE-2020-19190 https://nvd.nist.gov/vuln/detail/CVE-2020-19190 https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-19190.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6Cqvzp5JbuVfHsuYnIJNFw==&#34;: {&#xA;      &#34;id&#34;: &#34;6Cqvzp5JbuVfHsuYnIJNFw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4438&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the GNU C library (glibc). When applications use the `gethostbyaddr` or `gethostbyaddr_r` functions with a `nsswitch.conf` configuration that specifies glibc&#39;s DNS backend, the library may return an invalid DNS hostname. This violates the DNS specification and could lead to applications receiving incorrect hostname information, potentially impacting network operations or security decisions.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-20T19:59:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4438 https://bugzilla.redhat.com/show_bug.cgi?id=2449783 https://www.cve.org/CVERecord?id=CVE-2026-4438 https://nvd.nist.gov/vuln/detail/CVE-2026-4438 https://sourceware.org/bugzilla/show_bug.cgi?id=34015 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4438.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6FQUI3OxX4C5skWXKgq80Q==&#34;: {&#xA;      &#34;id&#34;: &#34;6FQUI3OxX4C5skWXKgq80Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0464&#34;,&#xA;      &#34;description&#34;: &#34;A security vulnerability has been identified in all supported OpenSSL versions related to verifying X.509 certificate chains that include policy constraints. This flaw allows attackers to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial of service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the -policy&#39; argument to the command line utilities or calling the X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0464 https://bugzilla.redhat.com/show_bug.cgi?id=2181082 https://www.cve.org/CVERecord?id=CVE-2023-0464 https://nvd.nist.gov/vuln/detail/CVE-2023-0464 https://www.openssl.org/news/secadv/20230322.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0464.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6Xr5PbPGSy+aHLDQ9q4L9w==&#34;: {&#xA;      &#34;id&#34;: &#34;6Xr5PbPGSy+aHLDQ9q4L9w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1502&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. This vulnerability allows for the injection of extra information into HTTP communication. Specifically, the system does not properly prevent special characters (carriage return and line feed) from being included in HTTP client proxy tunnel headers or host fields.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-10T17:54:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1502 https://bugzilla.redhat.com/show_bug.cgi?id=2457409 https://www.cve.org/CVERecord?id=CVE-2026-1502 https://nvd.nist.gov/vuln/detail/CVE-2026-1502 https://github.com/python/cpython/commit/05ed7ce7ae9e17c23a04085b2539fe6d6d3cef69 https://github.com/python/cpython/issues/146211 https://github.com/python/cpython/pull/146212 https://mail.python.org/archives/list/security-announce@python.org/thread/2IVPAEQWUJBCTQZEJEVTYCIKSMQPGRZ3/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1502.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;6p6EeZQEuYkK2CtO4ey3Ag==&#34;: {&#xA;      &#34;id&#34;: &#34;6p6EeZQEuYkK2CtO4ey3Ag==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66293&#34;,&#xA;      &#34;description&#34;: &#34;An out of bounds read vulnerability has been discovered in libpng. This vulnerability is in libpng&#39;s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng&#39;s internal state management.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-03T20:33:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66293 https://bugzilla.redhat.com/show_bug.cgi?id=2418711 https://www.cve.org/CVERecord?id=CVE-2025-66293 https://nvd.nist.gov/vuln/detail/CVE-2025-66293 https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1 https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a https://github.com/pnggroup/libpng/issues/764 https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66293.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7Puka2o1jq4jSr2Hekrfhg==&#34;: {&#xA;      &#34;id&#34;: &#34;7Puka2o1jq4jSr2Hekrfhg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1757&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1757 https://bugzilla.redhat.com/show_bug.cgi?id=2435940 https://www.cve.org/CVERecord?id=CVE-2026-1757 https://nvd.nist.gov/vuln/detail/CVE-2026-1757 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1009 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1757.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;7lnphmrb/VojuhlikpNO5w==&#34;: {&#xA;      &#34;id&#34;: &#34;7lnphmrb/VojuhlikpNO5w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-24401&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Avahi, a system that enables devices to discover services on a local network. A remote attacker can exploit this vulnerability by sending a specially crafted mDNS (multicast Domain Name System) response containing a recursive CNAME (Canonical Name) record. This triggers an uncontrolled recursion within the avahi-daemon process, leading to stack exhaustion and causing the service to crash. This results in a denial of service (DoS) for affected systems.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-24T01:25:02Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-24401 https://bugzilla.redhat.com/show_bug.cgi?id=2432534 https://www.cve.org/CVERecord?id=CVE-2026-24401 https://nvd.nist.gov/vuln/detail/CVE-2026-24401 https://github.com/avahi/avahi/commit/78eab31128479f06e30beb8c1cbf99dd921e2524 https://github.com/avahi/avahi/issues/501 https://github.com/avahi/avahi/security/advisories/GHSA-h4vp-5m8j-f6w3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-24401.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;86unVXyTxdffdcXWZTYw5g==&#34;: {&#xA;      &#34;id&#34;: &#34;86unVXyTxdffdcXWZTYw5g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0465&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. OpenSSL and other certificate policy checks silently ignore invalid certificate policies in leaf certificates that are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy&#39; argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()&#39; function.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0465 https://bugzilla.redhat.com/show_bug.cgi?id=2182561 https://www.cve.org/CVERecord?id=CVE-2023-0465 https://nvd.nist.gov/vuln/detail/CVE-2023-0465 https://www.openssl.org/news/secadv/20230328.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0465.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8D3i4K1ylUr5dGk9imV9zA==&#34;: {&#xA;      &#34;id&#34;: &#34;8D3i4K1ylUr5dGk9imV9zA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69420&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69420 https://bugzilla.redhat.com/show_bug.cgi?id=2430388 https://www.cve.org/CVERecord?id=CVE-2025-69420 https://nvd.nist.gov/vuln/detail/CVE-2025-69420 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69420.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8I2jFG8JRR+6+eqqYlXhAg==&#34;: {&#xA;      &#34;id&#34;: &#34;8I2jFG8JRR+6+eqqYlXhAg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-20225&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in python-pip due to a flaw in the --extra-index-url option, where it installs the version with the highest version number, even if the user intended to obtain a private package from a private index. Exploitation requires that the package does not already exist in the public index, allowing an attacker to place the package there with an arbitrary version number.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-04-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2018-20225 https://bugzilla.redhat.com/show_bug.cgi?id=1835736 https://www.cve.org/CVERecord?id=CVE-2018-20225 https://nvd.nist.gov/vuln/detail/CVE-2018-20225 https://cowlicks.website/posts/arbitrary-code-execution-from-pips-extra-index-url.html https://security.access.redhat.com/data/csaf/v2/vex/2018/cve-2018-20225.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8KJb4x3mXgChaQULEsid2A==&#34;: {&#xA;      &#34;id&#34;: &#34;8KJb4x3mXgChaQULEsid2A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15224&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcurl. When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15224 https://bugzilla.redhat.com/show_bug.cgi?id=2426410 https://www.cve.org/CVERecord?id=CVE-2025-15224 https://nvd.nist.gov/vuln/detail/CVE-2025-15224 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15224.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8Sec+JvKiQWGqYCOBdZhjg==&#34;: {&#xA;      &#34;id&#34;: &#34;8Sec+JvKiQWGqYCOBdZhjg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5918&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5918 https://bugzilla.redhat.com/show_bug.cgi?id=2370877 https://www.cve.org/CVERecord?id=CVE-2025-5918 https://nvd.nist.gov/vuln/detail/CVE-2025-5918 https://github.com/libarchive/libarchive/pull/2584 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5918.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8TgjbHNGzIFm7/fF9DBU7Q==&#34;: {&#xA;      &#34;id&#34;: &#34;8TgjbHNGzIFm7/fF9DBU7Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34757&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a library used for handling PNG (Portable Network Graphics) image files. This vulnerability arises when an application reuses a pointer, previously obtained from functions like png_get_PLTE, by passing it back to a corresponding setter function within the same image structure. This action causes the setter to access memory that has already been deallocated, leading to a use-after-free condition. A local attacker could potentially exploit this flaw to corrupt image metadata or disclose sensitive information from the application&#39;s memory.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-09T14:41:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34757 https://bugzilla.redhat.com/show_bug.cgi?id=2456918 https://www.cve.org/CVERecord?id=CVE-2026-34757 https://nvd.nist.gov/vuln/detail/CVE-2026-34757 https://github.com/pnggroup/libpng/commit/398cbe3df03f4e11bb031e07f416dfdde3684e8a https://github.com/pnggroup/libpng/commit/55d20aaa322c9274491cda82c5cd4f99b48c6bcc https://github.com/pnggroup/libpng/issues/836 https://github.com/pnggroup/libpng/issues/837 https://github.com/pnggroup/libpng/security/advisories/GHSA-6fr7-g8h7-v645 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34757.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8ZxbhBIT+9Mj99/XbMpLSQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8ZxbhBIT+9Mj99/XbMpLSQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0232&#34;,&#xA;      &#34;description&#34;: &#34;A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0232 https://bugzilla.redhat.com/show_bug.cgi?id=2243754 https://www.cve.org/CVERecord?id=CVE-2024-0232 https://nvd.nist.gov/vuln/detail/CVE-2024-0232 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0232.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8qOJVWAut1+UqTXPOWH12g==&#34;: {&#xA;      &#34;id&#34;: &#34;8qOJVWAut1+UqTXPOWH12g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8291&#34;,&#xA;      &#34;description&#34;: &#34;A zip file handling flaw has been discovered in the python standard library `zipfile` module. The &#39;zipfile&#39; module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the &#39;zipfile&#39; module compared to other ZIP implementations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-07T18:10:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8291 https://bugzilla.redhat.com/show_bug.cgi?id=2402342 https://www.cve.org/CVERecord?id=CVE-2025-8291 https://nvd.nist.gov/vuln/detail/CVE-2025-8291 https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267 https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6 https://github.com/python/cpython/issues/139700 https://github.com/python/cpython/pull/139702 https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8291.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8rvqTFlh9aOz4UvxQN0SBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;8rvqTFlh9aOz4UvxQN0SBQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3479&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s `pkgutil.get_data()` function, which is used to retrieve data from packages. This function did not properly validate the `resource` argument, allowing a local attacker to perform path traversal attacks. Path traversal enables an attacker to access files and directories stored outside the intended root directory, potentially leading to information disclosure or unintended file access.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T18:13:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3479 https://bugzilla.redhat.com/show_bug.cgi?id=2448746 https://www.cve.org/CVERecord?id=CVE-2026-3479 https://nvd.nist.gov/vuln/detail/CVE-2026-3479 https://github.com/python/cpython/issues/146121 https://github.com/python/cpython/pull/146122 https://mail.python.org/archives/list/security-announce@python.org/thread/WYLLVQOOCKGK73JM7Z7ZSNOJC4N7BAWY/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3479.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;8rxYDEPu2XxazQ3cBUhX0Q==&#34;: {&#xA;      &#34;id&#34;: &#34;8rxYDEPu2XxazQ3cBUhX0Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-9923&#34;,&#xA;      &#34;description&#34;: &#34;pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-01-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-9923 https://bugzilla.redhat.com/show_bug.cgi?id=1691764 https://www.cve.org/CVERecord?id=CVE-2019-9923 https://nvd.nist.gov/vuln/detail/CVE-2019-9923 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-9923.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;92KuvWwbPhsQNPu0knrHAQ==&#34;: {&#xA;      &#34;id&#34;: &#34;92KuvWwbPhsQNPu0knrHAQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6170&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6170 https://bugzilla.redhat.com/show_bug.cgi?id=2372952 https://www.cve.org/CVERecord?id=CVE-2025-6170 https://nvd.nist.gov/vuln/detail/CVE-2025-6170 https://gitlab.gnome.org/GNOME/libxml2/-/issues/941 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6170.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;97PwDrD8knMveLXwKCvQjA==&#34;: {&#xA;      &#34;id&#34;: &#34;97PwDrD8knMveLXwKCvQjA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22795&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22795 https://bugzilla.redhat.com/show_bug.cgi?id=2430389 https://www.cve.org/CVERecord?id=CVE-2026-22795 https://nvd.nist.gov/vuln/detail/CVE-2026-22795 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22795.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9jHXNtwzqlOir/Op7pd9+w==&#34;: {&#xA;      &#34;id&#34;: &#34;9jHXNtwzqlOir/Op7pd9+w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68276&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Avahi, a system that facilitates service discovery on a local network. An unprivileged local user can exploit this vulnerability by creating record browsers with the AVAHI_LOOKUP_USE_WIDE_AREA flag set via D-Bus. This can lead to a Denial of Service (DoS) by crashing the avahi-daemon, making the service unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T17:31:49Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68276 https://bugzilla.redhat.com/show_bug.cgi?id=2428713 https://www.cve.org/CVERecord?id=CVE-2025-68276 https://nvd.nist.gov/vuln/detail/CVE-2025-68276 https://github.com/avahi/avahi/commit/ede7048475c5d47d53890e3bc1350dda8e0b3688 https://github.com/avahi/avahi/pull/806 https://github.com/avahi/avahi/security/advisories/GHSA-mhf3-865v-g5rc https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68276.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9oBjtBiHtz7+Hwc4swPaAw==&#34;: {&#xA;      &#34;id&#34;: &#34;9oBjtBiHtz7+Hwc4swPaAw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34979&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenPrinting CUPS. A remote attacker could exploit a heap-based buffer overflow by sending specially crafted job attributes when building filter option strings. This could lead to a denial of service, making the printing system unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-03T21:16:38Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34979 https://bugzilla.redhat.com/show_bug.cgi?id=2454946 https://www.cve.org/CVERecord?id=CVE-2026-34979 https://nvd.nist.gov/vuln/detail/CVE-2026-34979 https://github.com/OpenPrinting/cups/security/advisories/GHSA-6qxf-7jx6-86fh https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34979.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9uK7ZDYgFtqP786n0QunAg==&#34;: {&#xA;      &#34;id&#34;: &#34;9uK7ZDYgFtqP786n0QunAg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-39804&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tar. This issue occurs when extended attributes are processed in PAX archives, and could allow an attacker to cause an application crash, resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-39804 https://bugzilla.redhat.com/show_bug.cgi?id=2254067 https://www.cve.org/CVERecord?id=CVE-2023-39804 https://nvd.nist.gov/vuln/detail/CVE-2023-39804 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39804.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;9zRC9UwUH2bQs1UcHQ5UTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;9zRC9UwUH2bQs1UcHQ5UTQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-9937&#34;,&#xA;      &#34;description&#34;: &#34;In SQLite 3.27.2, interleaving reads and writes in a single transaction with an fts5 virtual table will lead to a NULL Pointer Dereference in fts5ChunkIterate in sqlite3.c. This is related to ext/fts5/fts5_hash.c and ext/fts5/fts5_index.c.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-03-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-9937 https://bugzilla.redhat.com/show_bug.cgi?id=1692357 https://www.cve.org/CVERecord?id=CVE-2019-9937 https://nvd.nist.gov/vuln/detail/CVE-2019-9937 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-9937.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;A1UDSDMkPKOSx7ma/geQyg==&#34;: {&#xA;      &#34;id&#34;: &#34;A1UDSDMkPKOSx7ma/geQyg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68468&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Avahi. A remote attacker can cause a Denial of Service (DoS) by sending specially crafted unsolicited announcements containing CNAME resource records. These records, when pointing to other resource records with short Time-To-Live (TTL) values, can lead to the `avahi-daemon` crashing once they expire. This vulnerability impacts the availability of services relying on Avahi&#39;s service discovery.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T17:38:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68468 https://bugzilla.redhat.com/show_bug.cgi?id=2428714 https://www.cve.org/CVERecord?id=CVE-2025-68468 https://nvd.nist.gov/vuln/detail/CVE-2025-68468 https://github.com/avahi/avahi/commit/f66be13d7f31a3ef806d226bf8b67240179d309a https://github.com/avahi/avahi/issues/683 https://github.com/avahi/avahi/security/advisories/GHSA-cp79-r4x9-vf52 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68468.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AE8Cp1u8I9t52OYW7oGU4w==&#34;: {&#xA;      &#34;id&#34;: &#34;AE8Cp1u8I9t52OYW7oGU4w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-57970&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libarchive library. A specially-crafted tar file may trigger a head-based buffer over-read condition due to incorrect handling of truncation in the middle of a long GNU linkname. This issue can cause an application crash leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-57970 https://bugzilla.redhat.com/show_bug.cgi?id=2345954 https://www.cve.org/CVERecord?id=CVE-2024-57970 https://nvd.nist.gov/vuln/detail/CVE-2024-57970 https://github.com/libarchive/libarchive/issues/2415 https://github.com/libarchive/libarchive/pull/2422 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-57970.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;AZQ9MHTiNLYiRU7sYZlVGw==&#34;: {&#xA;      &#34;id&#34;: &#34;AZQ9MHTiNLYiRU7sYZlVGw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-4899&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in zstd. This flaw allows an attacker to supply an empty string as an argument to the command line tool to cause a buffer overrun.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-07-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-4899 https://bugzilla.redhat.com/show_bug.cgi?id=2179864 https://www.cve.org/CVERecord?id=CVE-2022-4899 https://nvd.nist.gov/vuln/detail/CVE-2022-4899 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4899.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zstd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;B5eXEM8SeidgdpzXoFJFGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;B5eXEM8SeidgdpzXoFJFGQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33636&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng. A remote attacker could exploit an out-of-bounds read and write vulnerability in the ARM/AArch64 Neon-optimized palette expansion path. This occurs when processing a final partial chunk of 8-bit paletted rows without verifying sufficient input pixels, leading to dereferencing pointers before the start of the row buffer and writing expanded pixel data to underflowed positions. This flaw can result in information disclosure and denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-26T16:51:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33636 https://bugzilla.redhat.com/show_bug.cgi?id=2451819 https://www.cve.org/CVERecord?id=CVE-2026-33636 https://nvd.nist.gov/vuln/detail/CVE-2026-33636 https://github.com/pnggroup/libpng/commit/7734cda20cf1236aef60f3bbd2267c97bbb40869 https://github.com/pnggroup/libpng/commit/aba9f18eba870d14fb52c5ba5d73451349e339c3 https://github.com/pnggroup/libpng/security/advisories/GHSA-wjr5-c57x-95m2 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33636.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BV++s35Ur4bQRS6HK0QCIA==&#34;: {&#xA;      &#34;id&#34;: &#34;BV++s35Ur4bQRS6HK0QCIA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-31789&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability, a heap buffer overflow, affects 32-bit systems when processing an unusually large X.509 certificate. If an application or service attempts to print or log such a specially crafted certificate, it could lead to a system crash or potentially allow an attacker to execute arbitrary code. This issue is considered low severity due to the specific conditions required for exploitation, including the need for an extremely large certificate and a 32-bit operating environment.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-31789 https://bugzilla.redhat.com/show_bug.cgi?id=2451095 https://www.cve.org/CVERecord?id=CVE-2026-31789 https://nvd.nist.gov/vuln/detail/CVE-2026-31789 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-31789.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Bgew407C4GMDdNe8dNeN7w==&#34;: {&#xA;      &#34;id&#34;: &#34;Bgew407C4GMDdNe8dNeN7w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-52615&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-52615 https://bugzilla.redhat.com/show_bug.cgi?id=2326418 https://www.cve.org/CVERecord?id=CVE-2024-52615 https://nvd.nist.gov/vuln/detail/CVE-2024-52615 https://github.com/avahi/avahi/pull/577 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-52615.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;BooDzA4nzaDI1l3E5zAHgg==&#34;: {&#xA;      &#34;id&#34;: &#34;BooDzA4nzaDI1l3E5zAHgg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-3997&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may lead to a denial of service at boot time when too many nested directories are created in /tmp.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-01-10T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-3997 https://bugzilla.redhat.com/show_bug.cgi?id=2024639 https://www.cve.org/CVERecord?id=CVE-2021-3997 https://nvd.nist.gov/vuln/detail/CVE-2021-3997 https://www.openwall.com/lists/oss-security/2022/01/10/2 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3997.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;DDWmqlxBSfXi2KJJ5mwTNg==&#34;: {&#xA;      &#34;id&#34;: &#34;DDWmqlxBSfXi2KJJ5mwTNg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-60753&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in apply_substitution() function in libarchive&#39;s bsdtar allows crafted -s substitution rules to repeatedly match a zero-length substring and append replacements without advancing the input pointer. When the rule uses the global /g flag (or an explicitly empty pattern), this leads to unbounded output allocation and eventual process OOM (Denial of Service). Upgrade to libarchive 3.8.1 or apply a patch that prevents zero-length match loops or rejects empty patterns.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-60753 https://bugzilla.redhat.com/show_bug.cgi?id=2412648 https://www.cve.org/CVERecord?id=CVE-2025-60753 https://nvd.nist.gov/vuln/detail/CVE-2025-60753 https://github.com/Papya-j/CVE/tree/main/CVE-2025-60753 https://github.com/libarchive/libarchive/issues/2725 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-60753.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EKs36DFwHVCzU/cF0Be9pQ==&#34;: {&#xA;      &#34;id&#34;: &#34;EKs36DFwHVCzU/cF0Be9pQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-29499&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-29499 https://bugzilla.redhat.com/show_bug.cgi?id=2211828 https://www.cve.org/CVERecord?id=CVE-2023-29499 https://nvd.nist.gov/vuln/detail/CVE-2023-29499 https://gitlab.gnome.org/GNOME/glib/-/issues/2794 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-29499.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EQ4eP3gKo3y8JsWUiWr6+g==&#34;: {&#xA;      &#34;id&#34;: &#34;EQ4eP3gKo3y8JsWUiWr6+g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-1000880&#34;,&#xA;      &#34;description&#34;: &#34;libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation vulnerability in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. This attack appear to be exploitable via the victim must open a specially crafted WARC file.&#34;,&#xA;      &#34;issued&#34;: &#34;2018-11-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2018-1000880 https://bugzilla.redhat.com/show_bug.cgi?id=1663892 https://www.cve.org/CVERecord?id=CVE-2018-1000880 https://nvd.nist.gov/vuln/detail/CVE-2018-1000880 https://security.access.redhat.com/data/csaf/v2/vex/2018/cve-2018-1000880.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EiJx6rOT8KoLX+Wu7/N6HQ==&#34;: {&#xA;      &#34;id&#34;: &#34;EiJx6rOT8KoLX+Wu7/N6HQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-27113&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. This vulnerability allows a NULL pointer dereference, leading to a potential crash or denial of service via a crafted XML pattern.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-27113 https://bugzilla.redhat.com/show_bug.cgi?id=2346410 https://www.cve.org/CVERecord?id=CVE-2025-27113 https://nvd.nist.gov/vuln/detail/CVE-2025-27113 https://gitlab.gnome.org/GNOME/libxml2/-/issues/861 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27113.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;EiL50P2QSOoRA18XAAH6Pg==&#34;: {&#xA;      &#34;id&#34;: &#34;EiL50P2QSOoRA18XAAH6Pg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32665&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32665 https://bugzilla.redhat.com/show_bug.cgi?id=2211827 https://www.cve.org/CVERecord?id=CVE-2023-32665 https://nvd.nist.gov/vuln/detail/CVE-2023-32665 https://gitlab.gnome.org/GNOME/glib/-/issues/2121 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32665.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ElIjMFAz33tt/XVMysRkdA==&#34;: {&#xA;      &#34;id&#34;: &#34;ElIjMFAz33tt/XVMysRkdA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0988&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0988 https://bugzilla.redhat.com/show_bug.cgi?id=2429886 https://www.cve.org/CVERecord?id=CVE-2026-0988 https://nvd.nist.gov/vuln/detail/CVE-2026-0988 https://gitlab.gnome.org/GNOME/glib/-/issues/3851 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0988.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;FkRDB0vpJYeh2ipqLS0/Iw==&#34;: {&#xA;      &#34;id&#34;: &#34;FkRDB0vpJYeh2ipqLS0/Iw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-28164&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng. This buffer overflow vulnerability allows a local attacker to cause a denial of service (DoS) by exploiting the `png_create_read_struct()` function. This can lead to the affected system becoming unresponsive or crashing.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-28164 https://bugzilla.redhat.com/show_bug.cgi?id=2433398 https://www.cve.org/CVERecord?id=CVE-2025-28164 https://nvd.nist.gov/vuln/detail/CVE-2025-28164 https://gist.github.com/kittener/506516f8c22178005b4379c8b2a7de20 https://github.com/pnggroup/libpng/issues/655 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-28164.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Fp999hDC/lucBsNHwOlp/A==&#34;: {&#xA;      &#34;id&#34;: &#34;Fp999hDC/lucBsNHwOlp/A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-13176&#34;,&#xA;      &#34;description&#34;: &#34;A timing side-channel vulnerability was found in OpenSSL. This vulnerability allows an attacker to recover the private key. However, measuring the timing would require local access to the signing application or a fast network connection with low latency. There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This issue can happen with significant probability only for some of the supported elliptic curves. In particular, the NIST P-521 curve is affected.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-01-20T13:29:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-13176 https://bugzilla.redhat.com/show_bug.cgi?id=2338999 https://www.cve.org/CVERecord?id=CVE-2024-13176 https://nvd.nist.gov/vuln/detail/CVE-2024-13176 https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-13176.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;G7IyfoPhe9f8QzIGbOfn7Q==&#34;: {&#xA;      &#34;id&#34;: &#34;G7IyfoPhe9f8QzIGbOfn7Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45322&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2. In an out-of-memory condition or when limiting the memory allocation, processing a XML document using the HTML parser may result in a use-after-free vulnerability.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-08-23T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45322 https://bugzilla.redhat.com/show_bug.cgi?id=2242945 https://www.cve.org/CVERecord?id=CVE-2023-45322 https://nvd.nist.gov/vuln/detail/CVE-2023-45322 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45322.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;H2CablNBrQ/I5AsUjk5xyw==&#34;: {&#xA;      &#34;id&#34;: &#34;H2CablNBrQ/I5AsUjk5xyw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-20839&#34;,&#xA;      &#34;description&#34;: &#34;systemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdown, or using Ctrl-Alt-F1 and Ctrl-Alt-F2. This occurs because the KDGKBMODE (aka current keyboard mode) check is mishandled.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-05-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2018-20839 https://bugzilla.redhat.com/show_bug.cgi?id=1716955 https://www.cve.org/CVERecord?id=CVE-2018-20839 https://nvd.nist.gov/vuln/detail/CVE-2018-20839 https://security.access.redhat.com/data/csaf/v2/vex/2018/cve-2018-20839.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;H9Ud41wofJc/QlL6Rm7WkA==&#34;: {&#xA;      &#34;id&#34;: &#34;H9Ud41wofJc/QlL6Rm7WkA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0968&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libssh in which a malicious SFTP (SSH File Transfer Protocol) server can exploit this by sending a malformed &#39;longname&#39; field within an `SSH_FXP_NAME` message during a file listing operation. This missing null check can lead to reading beyond allocated memory on the heap. This can cause unexpected behavior or lead to a denial of service (DoS) due to application crashes.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-10T18:46:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0968 https://bugzilla.redhat.com/show_bug.cgi?id=2436982 https://www.cve.org/CVERecord?id=CVE-2026-0968 https://nvd.nist.gov/vuln/detail/CVE-2026-0968 https://www.libssh.org/2026/02/10/libssh-0-12-0-and-0-11-4-security-releases/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0968.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HB9r/GLycEmk6aXttwtBlw==&#34;: {&#xA;      &#34;id&#34;: &#34;HB9r/GLycEmk6aXttwtBlw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-11468&#34;,&#xA;      &#34;description&#34;: &#34;Missing character filtering has been discovered in Python. When folding a long comment in an email header containing exclusively unfoldable characters, the parenthesis would not be preserved. This could be used for injecting headers into email messages where addresses are user-controlled and not sanitized.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:09:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-11468 https://bugzilla.redhat.com/show_bug.cgi?id=2431375 https://www.cve.org/CVERecord?id=CVE-2025-11468 https://nvd.nist.gov/vuln/detail/CVE-2025-11468 https://github.com/python/cpython/issues/143935 https://github.com/python/cpython/pull/143936 https://mail.python.org/archives/list/security-announce@python.org/thread/FELSEOLBI2QR6YLG6Q7VYF7FWSGQTKLI/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11468.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HKrLnQyTw1292mNt3MQ0aQ==&#34;: {&#xA;      &#34;id&#34;: &#34;HKrLnQyTw1292mNt3MQ0aQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-7592&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the `http.cookies` module in the Python package. When parsing cookies that contain backslashes, under certain circumstances, the module uses an algorithm with quadratic complexity, leading to excessive CPU consumption.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7592 https://bugzilla.redhat.com/show_bug.cgi?id=2305879 https://www.cve.org/CVERecord?id=CVE-2024-7592 https://nvd.nist.gov/vuln/detail/CVE-2024-7592 https://github.com/python/cpython/issues/123067 https://github.com/python/cpython/pull/123075 https://mail.python.org/archives/list/security-announce@python.org/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7592.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HNpGGr9eP5twQKC3yCh1mA==&#34;: {&#xA;      &#34;id&#34;: &#34;HNpGGr9eP5twQKC3yCh1mA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5915&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5915 https://bugzilla.redhat.com/show_bug.cgi?id=2370865 https://www.cve.org/CVERecord?id=CVE-2025-5915 https://nvd.nist.gov/vuln/detail/CVE-2025-5915 https://github.com/libarchive/libarchive/pull/2599 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5915.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HTk+AAyRWNCrZTtBLx34Aw==&#34;: {&#xA;      &#34;id&#34;: &#34;HTk+AAyRWNCrZTtBLx34Aw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-25260&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference vulnerability in the elfutils library has been discovered. This vulnerability occurs within the handle_verdef() function in the readelf.c source file. A NULL pointer dereference typically happens when a program attempts to access memory using a pointer that is not pointing anywhere (i.e., it&#39;s NULL), leading to a crash or potentially exploitable behavior.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-02-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-25260 https://bugzilla.redhat.com/show_bug.cgi?id=2265194 https://www.cve.org/CVERecord?id=CVE-2024-25260 https://nvd.nist.gov/vuln/detail/CVE-2024-25260 https://github.com/schsiung/fuzzer_issues/issues/1 https://sourceware.org/bugzilla/show_bug.cgi?id=31058 https://sourceware.org/elfutils/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25260.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;elfutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HdAyLUATPStr/HXiy9fgQw==&#34;: {&#xA;      &#34;id&#34;: &#34;HdAyLUATPStr/HXiy9fgQw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0990&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0990 https://bugzilla.redhat.com/show_bug.cgi?id=2429959 https://www.cve.org/CVERecord?id=CVE-2026-0990 https://nvd.nist.gov/vuln/detail/CVE-2026-0990 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0990.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HuLJLN6ajygY/CpLyzV5lw==&#34;: {&#xA;      &#34;id&#34;: &#34;HuLJLN6ajygY/CpLyzV5lw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-45803&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn&#39;t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren&#39;t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn&#39;t exploitable.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-10-13T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-45803 https://bugzilla.redhat.com/show_bug.cgi?id=2246840 https://www.cve.org/CVERecord?id=CVE-2023-45803 https://nvd.nist.gov/vuln/detail/CVE-2023-45803 https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9 https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4 https://www.rfc-editor.org/rfc/rfc9110.html#name-get https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45803.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;HuOxI+pWjgGV0XsBvltzlg==&#34;: {&#xA;      &#34;id&#34;: &#34;HuOxI+pWjgGV0XsBvltzlg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-19187&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ncurses library. This issue occurs when processing a crafted terminfo database, causing a heap-based buffer overflow, resulting in an application crash, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-05-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-19187 https://bugzilla.redhat.com/show_bug.cgi?id=2234911 https://www.cve.org/CVERecord?id=CVE-2020-19187 https://nvd.nist.gov/vuln/detail/CVE-2020-19187 https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-19187.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;I31WPu2ZGWOsqloSJfE2Fg==&#34;: {&#xA;      &#34;id&#34;: &#34;I31WPu2ZGWOsqloSJfE2Fg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25646&#34;,&#xA;      &#34;description&#34;: &#34;A heap based buffer overflow flaw has been discovered in LibPNG. Prior to version 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user&#39;s display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-10T17:04:38Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25646 https://bugzilla.redhat.com/show_bug.cgi?id=2438542 https://www.cve.org/CVERecord?id=CVE-2026-25646 https://nvd.nist.gov/vuln/detail/CVE-2026-25646 http://www.openwall.com/lists/oss-security/2026/02/09/7 https://github.com/pnggroup/libpng/commit/01d03b8453eb30ade759cd45c707e5a1c7277d88 https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25646.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;IItHEdPWz5fl9O7ZhzjDAA==&#34;: {&#xA;      &#34;id&#34;: &#34;IItHEdPWz5fl9O7ZhzjDAA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0672&#34;,&#xA;      &#34;description&#34;: &#34;An injection flaw has been discovered in Python. When using http.cookies.Morsel, user-controlled cookie values and parameters can allow injecting HTTP headers into messages. Patch rejects all control characters within cookie names, values, and parameters.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-20T21:52:33Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0672 https://bugzilla.redhat.com/show_bug.cgi?id=2431374 https://www.cve.org/CVERecord?id=CVE-2026-0672 https://nvd.nist.gov/vuln/detail/CVE-2026-0672 https://github.com/python/cpython/issues/143919 https://github.com/python/cpython/pull/143920 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0672.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;K3eafQ/8P8PEZ3BPWZfCgg==&#34;: {&#xA;      &#34;id&#34;: &#34;K3eafQ/8P8PEZ3BPWZfCgg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27447&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenPrinting CUPS. This authorization bypass vulnerability allows an unprivileged user to gain unauthorized access to restricted operations. This can be exploited by using a username that differs only in case from an authorized user during authorization checks.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-03T21:11:59Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27447 https://bugzilla.redhat.com/show_bug.cgi?id=2454949 https://www.cve.org/CVERecord?id=CVE-2026-27447 https://nvd.nist.gov/vuln/detail/CVE-2026-27447 https://github.com/OpenPrinting/cups/commit/88516bf6d9e34cef7a64a704b856b837f70cd220 https://github.com/OpenPrinting/cups/security/advisories/GHSA-v987-m8hp-phj9 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27447.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KCgCqCavM9U0xL+GHJqzSg==&#34;: {&#xA;      &#34;id&#34;: &#34;KCgCqCavM9U0xL+GHJqzSg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0964&#34;,&#xA;      &#34;description&#34;: &#34;A malicious SCP server can send unexpected paths that could make the\nclient application override local files outside of working directory.\nThis could be misused to create malicious executable or configuration\nfiles and make the user execute them under specific consequences.\n\nThis is the same issue as in OpenSSH, tracked as CVE-2019-6111.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-10T18:44:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0964 https://bugzilla.redhat.com/show_bug.cgi?id=2436979 https://www.cve.org/CVERecord?id=CVE-2026-0964 https://nvd.nist.gov/vuln/detail/CVE-2026-0964 https://www.libssh.org/2026/02/10/libssh-0-12-0-and-0-11-4-security-releases/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0964.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KExChYIaW0MvXNLWbjS/Hw==&#34;: {&#xA;      &#34;id&#34;: &#34;KExChYIaW0MvXNLWbjS/Hw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-41080&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat. A remote attacker could exploit this vulnerability by providing a specially crafted XML document that leverages insufficient entropy in the hash function. This can lead to hash flooding, a type of Denial of Service (DoS) attack, where the system becomes unresponsive or crashes due to excessive resource consumption.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-16T16:52:01Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-41080 https://bugzilla.redhat.com/show_bug.cgi?id=2458967 https://www.cve.org/CVERecord?id=CVE-2026-41080 https://nvd.nist.gov/vuln/detail/CVE-2026-41080 https://github.com/libexpat/libexpat/issues/47 https://github.com/libexpat/libexpat/pull/1183 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-41080.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;KaROgE0QmtiOixMG9Wi1RA==&#34;: {&#xA;      &#34;id&#34;: &#34;KaROgE0QmtiOixMG9Wi1RA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32636&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32636 https://bugzilla.redhat.com/show_bug.cgi?id=2211833 https://www.cve.org/CVERecord?id=CVE-2023-32636 https://nvd.nist.gov/vuln/detail/CVE-2023-32636 https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835 https://gitlab.gnome.org/GNOME/glib/-/issues/2841 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32636.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;L3k0cIIlkMGQFiWnZm8Mlg==&#34;: {&#xA;      &#34;id&#34;: &#34;L3k0cIIlkMGQFiWnZm8Mlg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-12781&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the base64 module in the Python standard library. The b64decode, standard_b64decode and urlsafe_b64decode functions will always accept the &#39;+&#39; and &#39;/&#39; characters even when an alternative base64 alphabet is specified via the altchars parameter that excludes them. This input validation bypass allows malformed or unexpected data to pass through decoding filters, potentially causing logical errors or data integrity issues in applications relying on strict character sets.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-21T19:34:47Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-12781 https://bugzilla.redhat.com/show_bug.cgi?id=2431736 https://www.cve.org/CVERecord?id=CVE-2025-12781 https://nvd.nist.gov/vuln/detail/CVE-2025-12781 https://github.com/python/cpython/issues/125346 https://github.com/python/cpython/pull/141128 https://mail.python.org/archives/list/security-announce@python.org/thread/KRI7GC6S27YV5NJ4FPDALS2WI5ENAFJ6/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-12781.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;L7QbkTbsy8v3tMfOqNsVKQ==&#34;: {&#xA;      &#34;id&#34;: &#34;L7QbkTbsy8v3tMfOqNsVKQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-7531&#34;,&#xA;      &#34;description&#34;: &#34;The Mozilla Foundation Security Advisory describes this flaw as:\n\nCalling PK11_Encrypt() in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on Intel Sandy Bridge and later processors. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7531 https://bugzilla.redhat.com/show_bug.cgi?id=2303148 https://www.cve.org/CVERecord?id=CVE-2024-7531 https://nvd.nist.gov/vuln/detail/CVE-2024-7531 https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7531 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7531.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;nss&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;LWLSX4FCLbzYWK97i5Or+A==&#34;: {&#xA;      &#34;id&#34;: &#34;LWLSX4FCLbzYWK97i5Or+A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28389&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker could exploit this by sending a specially crafted Cryptographic Message Syntax (CMS) EnvelopedData message with KeyAgreeRecipientInfo. This vulnerability arises because the software attempts to process an optional field without verifying its existence, leading to a NULL pointer dereference. This can result in a Denial of Service (DoS) for applications that handle untrusted CMS data.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28389 https://bugzilla.redhat.com/show_bug.cgi?id=2451096 https://www.cve.org/CVERecord?id=CVE-2026-28389 https://nvd.nist.gov/vuln/detail/CVE-2026-28389 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28389.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Lt2Hg7sVYgz0GD7ldFmjjA==&#34;: {&#xA;      &#34;id&#34;: &#34;Lt2Hg7sVYgz0GD7ldFmjjA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32777&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat. A remote attacker could exploit this vulnerability by providing specially crafted Document Type Definition (DTD) content. This could lead to an infinite loop during parsing, resulting in a Denial of Service (DoS) for the application using libexpat.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-16T06:58:06Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32777 https://bugzilla.redhat.com/show_bug.cgi?id=2447890 https://www.cve.org/CVERecord?id=CVE-2026-32777 https://nvd.nist.gov/vuln/detail/CVE-2026-32777 https://github.com/libexpat/libexpat/issues/1161 https://github.com/libexpat/libexpat/pull/1159 https://github.com/libexpat/libexpat/pull/1162 https://issues.oss-fuzz.com/issues/486993411 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32777.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MRnBR1NwPejsF0F/Po53Ew==&#34;: {&#xA;      &#34;id&#34;: &#34;MRnBR1NwPejsF0F/Po53Ew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-8905&#34;,&#xA;      &#34;description&#34;: &#34;do_core_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printable, a different vulnerability than CVE-2018-10360.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-02-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-8905 https://bugzilla.redhat.com/show_bug.cgi?id=1679181 https://www.cve.org/CVERecord?id=CVE-2019-8905 https://nvd.nist.gov/vuln/detail/CVE-2019-8905 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-8905.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;file&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;MW3KGjkk7BWuR5JCc6cywg==&#34;: {&#xA;      &#34;id&#34;: &#34;MW3KGjkk7BWuR5JCc6cywg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-52616&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-11-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-52616 https://bugzilla.redhat.com/show_bug.cgi?id=2326429 https://www.cve.org/CVERecord?id=CVE-2024-52616 https://nvd.nist.gov/vuln/detail/CVE-2024-52616 https://github.com/avahi/avahi/pull/577 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-52616.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;O6eQrDqYe8zCvECWFMIzFQ==&#34;: {&#xA;      &#34;id&#34;: &#34;O6eQrDqYe8zCvECWFMIzFQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-8906&#34;,&#xA;      &#34;description&#34;: &#34;do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-01-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-8906 https://bugzilla.redhat.com/show_bug.cgi?id=1679175 https://www.cve.org/CVERecord?id=CVE-2019-8906 https://nvd.nist.gov/vuln/detail/CVE-2019-8906 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-8906.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;file&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;O8fIVXqcGshIonMWsEH9gA==&#34;: {&#xA;      &#34;id&#34;: &#34;O8fIVXqcGshIonMWsEH9gA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5916&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive. This bug affects libarchive versions prior to 3.8.0.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5916 https://bugzilla.redhat.com/show_bug.cgi?id=2370872 https://www.cve.org/CVERecord?id=CVE-2025-5916 https://nvd.nist.gov/vuln/detail/CVE-2025-5916 https://github.com/libarchive/libarchive/pull/2568 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5916.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OFdQC3/0S5rItoyqpACTFw==&#34;: {&#xA;      &#34;id&#34;: &#34;OFdQC3/0S5rItoyqpACTFw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4224&#34;,&#xA;      &#34;description&#34;: &#34;A stack overflow flaw has been discovered in the python pyexpat module. When an Expat parser with a registered ElementDeclHandler parses an inline document type definition containing a deeply nested content model a C stack overflow occurs. This will result in a program crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-16T17:52:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4224 https://bugzilla.redhat.com/show_bug.cgi?id=2448181 https://www.cve.org/CVERecord?id=CVE-2026-4224 https://nvd.nist.gov/vuln/detail/CVE-2026-4224 https://github.com/python/cpython/commit/196edfb06a7458377d4d0f4b3cd41724c1f3bd4a https://github.com/python/cpython/commit/e0a8a6da90597a924b300debe045cdb4628ee1f3 https://github.com/python/cpython/commit/eb0e8be3a7e11b87d198a2c3af1ed0eccf532768 https://github.com/python/cpython/issues/145986 https://github.com/python/cpython/pull/145987 https://mail.python.org/archives/list/security-announce@python.org/thread/5M7CGUW3XBRY7II4DK43KF7NQQ3TPZ6R/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4224.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OLKvdPVgT9/lPcflJTxE3Q==&#34;: {&#xA;      &#34;id&#34;: &#34;OLKvdPVgT9/lPcflJTxE3Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68160&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68160 https://bugzilla.redhat.com/show_bug.cgi?id=2430380 https://www.cve.org/CVERecord?id=CVE-2025-68160 https://nvd.nist.gov/vuln/detail/CVE-2025-68160 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68160.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OPNDKUsVLJt2v1gO1zvkBA==&#34;: {&#xA;      &#34;id&#34;: &#34;OPNDKUsVLJt2v1gO1zvkBA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-1632&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the bsdunzip utility of libarchive. In affected versions, a specially crafted file may trigger a null pointer dereference. This issue can lead to an application crash or other unexpected behavior. This bug does not compromise the integrity or availability of the base system.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-02-24T13:31:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-1632 https://bugzilla.redhat.com/show_bug.cgi?id=2347309 https://www.cve.org/CVERecord?id=CVE-2025-1632 https://nvd.nist.gov/vuln/detail/CVE-2025-1632 https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc https://vuldb.com/?ctiid.296619 https://vuldb.com/?id.296619 https://vuldb.com/?submit.496460 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1632.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OTZM0RD60ajdSeEqWGkkTw==&#34;: {&#xA;      &#34;id&#34;: &#34;OTZM0RD60ajdSeEqWGkkTw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-26740&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in giflib. A remote attacker can exploit a buffer overflow vulnerability in the EGifGCBToExtension function by providing a specially crafted Graphics Control Extension (GCE) block. This allows overwriting an existing GCE block without proper size validation, leading to a denial of service (DoS) on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-26740 https://bugzilla.redhat.com/show_bug.cgi?id=2448747 https://www.cve.org/CVERecord?id=CVE-2026-26740 https://nvd.nist.gov/vuln/detail/CVE-2026-26740 https://github.com/zakkanijia/POC/blob/main/giflib/giftool/giflib_giftool_gce_len_heap_oobwrite_disclosure.md https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-26740.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OgFGrvrnAoXXvapnatTrxQ==&#34;: {&#xA;      &#34;id&#34;: &#34;OgFGrvrnAoXXvapnatTrxQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0965&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libssh where it can attempt to open arbitrary files during configuration parsing. A local attacker can exploit this by providing a malicious configuration file or when the system is misconfigured. This vulnerability could lead to a Denial of Service (DoS) by causing the system to try and access dangerous files, such as block devices or large system files, which can disrupt normal operations.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-10T18:47:22Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0965 https://bugzilla.redhat.com/show_bug.cgi?id=2436980 https://www.cve.org/CVERecord?id=CVE-2026-0965 https://nvd.nist.gov/vuln/detail/CVE-2026-0965 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0965.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Oi3Y6I7JDcoQrQyH+jMXWw==&#34;: {&#xA;      &#34;id&#34;: &#34;Oi3Y6I7JDcoQrQyH+jMXWw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14087&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-05T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14087 https://bugzilla.redhat.com/show_bug.cgi?id=2419093 https://www.cve.org/CVERecord?id=CVE-2025-14087 https://nvd.nist.gov/vuln/detail/CVE-2025-14087 https://gitlab.gnome.org/GNOME/glib/-/issues/3834 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14087.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;OpUahpCA4oBceG962KxTMA==&#34;: {&#xA;      &#34;id&#34;: &#34;OpUahpCA4oBceG962KxTMA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22796&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22796 https://bugzilla.redhat.com/show_bug.cgi?id=2430390 https://www.cve.org/CVERecord?id=CVE-2026-22796 https://nvd.nist.gov/vuln/detail/CVE-2026-22796 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22796.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;PcNbuWOo0ahqjfbOQhXvvQ==&#34;: {&#xA;      &#34;id&#34;: &#34;PcNbuWOo0ahqjfbOQhXvvQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-41996&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the Diffie-Hellman Ephemeral (DHE) Key Agreement Protocol, where a malicious client can exploit the server&#39;s public key validation process. By forcing the server to use DHE and validating the order of public keys, the client can trigger expensive server-side modular exponentiation calculations. This issue results in asymmetric resource consumption, potentially leading to a denial of service (DoS) attack by overwhelming the server with computationally intensive operations.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-08-26T06:15:04Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-41996 https://bugzilla.redhat.com/show_bug.cgi?id=2307826 https://www.cve.org/CVERecord?id=CVE-2024-41996 https://nvd.nist.gov/vuln/detail/CVE-2024-41996 https://dheatattack.gitlab.io/details/ https://dheatattack.gitlab.io/faq/ https://gist.github.com/c0r0n3r/abccc14d4d96c0442f3a77fa5ca255d1 https://github.com/openssl/openssl/issues/17374 https://openssl-library.org/post/2022-10-21-tls-groups-configuration/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-41996.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Pe4IHqZpuBtuSkrgd2HMEg==&#34;: {&#xA;      &#34;id&#34;: &#34;Pe4IHqZpuBtuSkrgd2HMEg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13034&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When configured to use public key pinning with QUIC connections and GnuTLS, and with standard certificate verification explicitly disabled, curl could bypass the intended public key check. This oversight allows a malicious server to impersonate a legitimate one, potentially leading to unauthorized access or information disclosure due to a failure in verifying the server&#39;s identity.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13034 https://bugzilla.redhat.com/show_bug.cgi?id=2426406 https://www.cve.org/CVERecord?id=CVE-2025-13034 https://nvd.nist.gov/vuln/detail/CVE-2025-13034 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13034.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Q5xJp4zJ1MCYcYbDi9qrdQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Q5xJp4zJ1MCYcYbDi9qrdQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25068&#34;,&#xA;      &#34;description&#34;: &#34;alsa-lib versions 1.2.2 up to and including 1.2.15.2, prior to commit 5f7fe33, contain a heap-based buffer overflow in the topology mixer control decoder. The tplg_decode_control_mixer1() function reads the num_channels field from untrusted .tplg data and uses it as a loop bound without validating it against the fixed-size channel array (SND_TPLG_MAX_CHAN). A crafted topology file with an excessive num_channels value can cause out-of-bounds heap writes, leading to a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-29T19:08:03Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25068 https://bugzilla.redhat.com/show_bug.cgi?id=2435372 https://www.cve.org/CVERecord?id=CVE-2026-25068 https://nvd.nist.gov/vuln/detail/CVE-2026-25068 https://github.com/alsa-project/alsa-lib/commit/5f7fe33002d2d98d84f72e381ec2cccc0d5d3d40 https://www.vulncheck.com/advisories/alsa-lib-topology-decoder-heap-based-buffer-overflow https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25068.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;alsa-lib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QSNBg/XspHcBwSxBTMU4rg==&#34;: {&#xA;      &#34;id&#34;: &#34;QSNBg/XspHcBwSxBTMU4rg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-50181&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in urllib3. The `PoolManager` class allows redirects to be disabled by configuring retries in a specific manner, effectively bypassing intended HTTP redirection behavior. A network attacker can leverage this configuration to manipulate request flows and disrupt service. This bypass occurs through improper handling of retry parameters during PoolManager instantiation. This issue can reult in a denial of service or unintended data exposure due to altered request destinations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-19T01:08:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-50181 https://bugzilla.redhat.com/show_bug.cgi?id=2373799 https://www.cve.org/CVERecord?id=CVE-2025-50181 https://nvd.nist.gov/vuln/detail/CVE-2025-50181 https://github.com/urllib3/urllib3/commit/f05b1329126d5be6de501f9d1e3e36738bc08857 https://github.com/urllib3/urllib3/security/advisories/GHSA-pq67-6m6q-mj2v https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-50181.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QUtTYJuHdkAOgtveagWUfA==&#34;: {&#xA;      &#34;id&#34;: &#34;QUtTYJuHdkAOgtveagWUfA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-0466&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. The X509_VERIFY_PARAM_add0_policy() function is documented to enable the certificate policy check when doing certificate verification implicitly. However, implementing the function does not enable the check, allowing certificates with invalid or incorrect policies to pass the certificate verification. Suddenly enabling the policy check could break existing deployments, so it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. The applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-0466 https://bugzilla.redhat.com/show_bug.cgi?id=2182565 https://www.cve.org/CVERecord?id=CVE-2023-0466 https://nvd.nist.gov/vuln/detail/CVE-2023-0466 https://www.openssl.org/news/secadv/20230328.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0466.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;QcOTYeOedG0AUhPSakMpIA==&#34;: {&#xA;      &#34;id&#34;: &#34;QcOTYeOedG0AUhPSakMpIA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-4741&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free vulnerability was found in OpenSSL. Calling the OpenSSL API SSL_free_buffers function may cause memory to be accessed that was previously freed in some situations.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-4741 https://bugzilla.redhat.com/show_bug.cgi?id=2283757 https://www.cve.org/CVERecord?id=CVE-2024-4741 https://nvd.nist.gov/vuln/detail/CVE-2024-4741 https://www.openssl.org/news/secadv/20240528.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-4741.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RVCidRUm4D1IKoPhoUi2AA==&#34;: {&#xA;      &#34;id&#34;: &#34;RVCidRUm4D1IKoPhoUi2AA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-9674&#34;,&#xA;      &#34;description&#34;: &#34;A ZIP bomb attack was found in the Python zipfile module. A remote attacker could abuse this flaw by providing a specially crafted ZIP file that, when decompressed by zipfile, would exhaust system resources resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-03-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-9674 https://bugzilla.redhat.com/show_bug.cgi?id=1800749 https://www.cve.org/CVERecord?id=CVE-2019-9674 https://nvd.nist.gov/vuln/detail/CVE-2019-9674 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-9674.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RXjd5U95osIGXnqCa34Jkg==&#34;: {&#xA;      &#34;id&#34;: &#34;RXjd5U95osIGXnqCa34Jkg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0989&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested \u003cinclude\u003e directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0989 https://bugzilla.redhat.com/show_bug.cgi?id=2429933 https://www.cve.org/CVERecord?id=CVE-2026-0989 https://nvd.nist.gov/vuln/detail/CVE-2026-0989 https://gitlab.gnome.org/GNOME/libxml2/-/issues/998 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0989.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RYqFgDYIttLgJc8B82sK/w==&#34;: {&#xA;      &#34;id&#34;: &#34;RYqFgDYIttLgJc8B82sK/w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-66382&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat. This vulnerability allows a denial of service (DoS) by processing a crafted file with an approximate size of 2 MiB, leading to dozens of seconds of processing time.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-66382 https://bugzilla.redhat.com/show_bug.cgi?id=2417661 https://www.cve.org/CVERecord?id=CVE-2025-66382 https://nvd.nist.gov/vuln/detail/CVE-2025-66382 https://github.com/libexpat/libexpat/issues/1076 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-66382.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;RdjNn4dAdZKcn6VS95a/SQ==&#34;: {&#xA;      &#34;id&#34;: &#34;RdjNn4dAdZKcn6VS95a/SQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-39314&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CUPS, an open-source printing system. An unprivileged local user can exploit an integer underflow vulnerability by providing a negative job-password-supported Internet Printing Protocol (IPP) attribute. This manipulation causes the cupsd root process to crash, which can be repeatedly triggered to achieve a sustained Denial of Service (DoS) on the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T16:59:23Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-39314 https://bugzilla.redhat.com/show_bug.cgi?id=2456107 https://www.cve.org/CVERecord?id=CVE-2026-39314 https://nvd.nist.gov/vuln/detail/CVE-2026-39314 https://github.com/OpenPrinting/cups/security/advisories/GHSA-pp8w-2g52-7vj7 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-39314.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Rfm1tD+QxSP/TVjKFDNabg==&#34;: {&#xA;      &#34;id&#34;: &#34;Rfm1tD+QxSP/TVjKFDNabg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0967&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular expression backtracking. This can cause timeouts and resource exhaustion, resulting in a Denial of Service (DoS) for the client.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-10T18:47:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0967 https://bugzilla.redhat.com/show_bug.cgi?id=2436981 https://www.cve.org/CVERecord?id=CVE-2026-0967 https://nvd.nist.gov/vuln/detail/CVE-2026-0967 https://www.libssh.org/2026/02/10/libssh-0-12-0-and-0-11-4-security-releases/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0967.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Rw8DyDlyRHRJOeZaAbGMRA==&#34;: {&#xA;      &#34;id&#34;: &#34;Rw8DyDlyRHRJOeZaAbGMRA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-59529&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in avahi. The simple protocol server ignores the documented client limit and accepts unlimited connections, allowing for easy local Denial of Service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-59529 https://bugzilla.redhat.com/show_bug.cgi?id=2405338 https://www.cve.org/CVERecord?id=CVE-2025-59529 https://nvd.nist.gov/vuln/detail/CVE-2025-59529 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59529.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;S7qx7a03HASsJhyQafvXjg==&#34;: {&#xA;      &#34;id&#34;: &#34;S7qx7a03HASsJhyQafvXjg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-19211&#34;,&#xA;      &#34;description&#34;: &#34;In ncurses 6.1, there is a NULL pointer dereference at function _nc_parse_entry in parse_entry.c that will lead to a denial of service attack. The product proceeds to the dereference code path even after a \&#34;dubious character `*&#39; in name or alias field\&#34; detection.&#34;,&#xA;      &#34;issued&#34;: &#34;2018-10-28T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2018-19211 https://bugzilla.redhat.com/show_bug.cgi?id=1652600 https://www.cve.org/CVERecord?id=CVE-2018-19211 https://nvd.nist.gov/vuln/detail/CVE-2018-19211 https://security.access.redhat.com/data/csaf/v2/vex/2018/cve-2018-19211.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SHxE0qXbBmDEp/LL1ieJeA==&#34;: {&#xA;      &#34;id&#34;: &#34;SHxE0qXbBmDEp/LL1ieJeA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-19189&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in the ncurses library. This issue occurs when processing a crafted terminfo database, causing a heap-based buffer overflow, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-05-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-19189 https://bugzilla.redhat.com/show_bug.cgi?id=2234926 https://www.cve.org/CVERecord?id=CVE-2020-19189 https://nvd.nist.gov/vuln/detail/CVE-2020-19189 https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-19189.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;SixpK4TZp5ARiPVlZlGpew==&#34;: {&#xA;      &#34;id&#34;: &#34;SixpK4TZp5ARiPVlZlGpew==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4878&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2451615 https://www.cve.org/CVERecord?id=CVE-2026-4878 https://nvd.nist.gov/vuln/detail/CVE-2026-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2447554 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4878.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libcap&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;TLOrmSYL76Du+GI4WD9gMQ==&#34;: {&#xA;      &#34;id&#34;: &#34;TLOrmSYL76Du+GI4WD9gMQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-34459&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the xmllint program distributed by the libxml2 package. A buffer over-read in the xmlHTMLPrintFileContext function in the xmllint.c file may be triggered when a crafted file is processed with the xmllint program using the `--htmlout` command line option, causing an application crash and resulting in a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-05-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-34459 https://bugzilla.redhat.com/show_bug.cgi?id=2280532 https://www.cve.org/CVERecord?id=CVE-2024-34459 https://nvd.nist.gov/vuln/detail/CVE-2024-34459 https://gitlab.gnome.org/GNOME/libxml2/-/issues/720 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34459.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Te9j1HGn7feNCE/Fduu0+A==&#34;: {&#xA;      &#34;id&#34;: &#34;Te9j1HGn7feNCE/Fduu0+A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-64505&#34;,&#xA;      &#34;description&#34;: &#34;A heap buffer over-read vulnerability exists in libpng&#39;s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T23:38:40Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-64505 https://bugzilla.redhat.com/show_bug.cgi?id=2416905 https://www.cve.org/CVERecord?id=CVE-2025-64505 https://nvd.nist.gov/vuln/detail/CVE-2025-64505 https://github.com/pnggroup/libpng/commit/6a528eb5fd0dd7f6de1c39d30de0e41473431c37 https://github.com/pnggroup/libpng/pull/748 https://github.com/pnggroup/libpng/security/advisories/GHSA-4952-h5wq-4m42 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-64505.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;TuBnhFrkwMqIcYtYYgNGNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;TuBnhFrkwMqIcYtYYgNGNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3784&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. This vulnerability allows curl to wrongly reuse an existing HTTP proxy connection when performing a CONNECT request to a server, even if the new request uses different authentication credentials for the HTTP proxy. This improper connection reuse could lead to an attacker gaining unauthorized access to resources or information intended for a different user.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:09:21Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3784 https://bugzilla.redhat.com/show_bug.cgi?id=2446449 https://www.cve.org/CVERecord?id=CVE-2026-3784 https://nvd.nist.gov/vuln/detail/CVE-2026-3784 http://www.openwall.com/lists/oss-security/2026/03/11/3 https://curl.se/docs/CVE-2026-3784.html https://curl.se/docs/CVE-2026-3784.json https://hackerone.com/reports/3584903 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3784.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UMD4nV1Ky5C5eKUMgtnKzw==&#34;: {&#xA;      &#34;id&#34;: &#34;UMD4nV1Ky5C5eKUMgtnKzw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-20193&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the src/list.c of tar. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-01-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-20193 https://bugzilla.redhat.com/show_bug.cgi?id=1917565 https://www.cve.org/CVERecord?id=CVE-2021-20193 https://nvd.nist.gov/vuln/detail/CVE-2021-20193 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-20193.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UPzTyNn8ZLXlb+bwRFPPTA==&#34;: {&#xA;      &#34;id&#34;: &#34;UPzTyNn8ZLXlb+bwRFPPTA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-2650&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL resulting in a possible denial of service while translating ASN.1 object identifiers. Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience long delays when processing messages, which may lead to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-05-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-2650 https://bugzilla.redhat.com/show_bug.cgi?id=2207947 https://www.cve.org/CVERecord?id=CVE-2023-2650 https://nvd.nist.gov/vuln/detail/CVE-2023-2650 https://www.openssl.org/news/secadv/20230530.txt https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2650.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UbmdE2pHXRFccv8l1e02Jw==&#34;: {&#xA;      &#34;id&#34;: &#34;UbmdE2pHXRFccv8l1e02Jw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-4156&#34;,&#xA;      &#34;description&#34;: &#34;A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-06-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-4156 https://bugzilla.redhat.com/show_bug.cgi?id=2215930 https://www.cve.org/CVERecord?id=CVE-2023-4156 https://nvd.nist.gov/vuln/detail/CVE-2023-4156 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4156.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gawk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UgHucRu0hN47CoyxGAMXTQ==&#34;: {&#xA;      &#34;id&#34;: &#34;UgHucRu0hN47CoyxGAMXTQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28386&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. Applications using AES-CFB128 encryption or decryption on systems with AVX-512 and VAES support may experience a Denial of Service (DoS). This occurs when processing partial cipher blocks, specifically if the input buffer ends at a memory page boundary and the subsequent page is unmapped. This can lead to an out-of-bounds read of up to 15 bytes and a potential application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28386 https://bugzilla.redhat.com/show_bug.cgi?id=2451099 https://www.cve.org/CVERecord?id=CVE-2026-28386 https://nvd.nist.gov/vuln/detail/CVE-2026-28386 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28386.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UoEFDYM+Gqf2mdRJh5HUFw==&#34;: {&#xA;      &#34;id&#34;: &#34;UoEFDYM+Gqf2mdRJh5HUFw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-45582&#34;,&#xA;      &#34;description&#34;: &#34;A relative path traversal flaw was found in the gnu tar utility. When archives with relative paths are extracted without the ‘--keep-old-files’ (‘-k’), the extraction process may overwrite existing files that the current user has access to. The server may be impacted if these files are critical to the operation of some service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-45582 https://bugzilla.redhat.com/show_bug.cgi?id=2379592 https://www.cve.org/CVERecord?id=CVE-2025-45582 https://nvd.nist.gov/vuln/detail/CVE-2025-45582 https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md https://www.gnu.org/software/tar/ https://www.gnu.org/software/tar/manual/html_node/Integrity.html#Integrity https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-45582.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;UyCjBcpeB0nhkRTVhUcAJQ==&#34;: {&#xA;      &#34;id&#34;: &#34;UyCjBcpeB0nhkRTVhUcAJQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-39316&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CUPS, an open-source printing system. This vulnerability, known as a use-after-free, occurs in the CUPS scheduler when temporary printers are automatically removed. The system fails to properly manage memory, leaving a pointer to a freed memory location. An attacker could exploit this to cause the CUPS daemon to crash, leading to a denial of service. In more severe scenarios, this could potentially allow an attacker to execute arbitrary code.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T17:00:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-39316 https://bugzilla.redhat.com/show_bug.cgi?id=2456120 https://www.cve.org/CVERecord?id=CVE-2026-39316 https://nvd.nist.gov/vuln/detail/CVE-2026-39316 https://github.com/OpenPrinting/cups/security/advisories/GHSA-pjv5-prqp-46rg https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-39316.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VLzwKVDYC7fQrtcpCzjXjA==&#34;: {&#xA;      &#34;id&#34;: &#34;VLzwKVDYC7fQrtcpCzjXjA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69418&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69418 https://bugzilla.redhat.com/show_bug.cgi?id=2430381 https://www.cve.org/CVERecord?id=CVE-2025-69418 https://nvd.nist.gov/vuln/detail/CVE-2025-69418 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69418.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VPoF+qCqaQ4y2sVl2255/g==&#34;: {&#xA;      &#34;id&#34;: &#34;VPoF+qCqaQ4y2sVl2255/g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33416&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a library used for processing PNG (Portable Network Graphics) image files. This vulnerability arises from improper memory management where a heap-allocated buffer is aliased between internal data structures. When specific functions are called, a freed memory region can still be referenced, leading to a use-after-free condition. An attacker could potentially exploit this to achieve arbitrary code execution or cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-26T16:48:54Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33416 https://bugzilla.redhat.com/show_bug.cgi?id=2451805 https://www.cve.org/CVERecord?id=CVE-2026-33416 https://nvd.nist.gov/vuln/detail/CVE-2026-33416 https://github.com/pnggroup/libpng/commit/23019269764e35ed8458e517f1897bd3c54820eb https://github.com/pnggroup/libpng/commit/7ea9eea884a2328cc7fdcb3c0c00246a50d90667 https://github.com/pnggroup/libpng/commit/a3a21443ed12bfa1ef46fa0d4fb2b74a0fa34a25 https://github.com/pnggroup/libpng/commit/c1b0318b393c90679e6fa5bc1d329fd5d5012ec1 https://github.com/pnggroup/libpng/pull/824 https://github.com/pnggroup/libpng/security/advisories/GHSA-m4pc-p4q3-4c7j https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33416.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;VsocCwaFpF6PzdX5PxR+sQ==&#34;: {&#xA;      &#34;id&#34;: &#34;VsocCwaFpF6PzdX5PxR+sQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-19185&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in the ncurses library. This issue occurs when processing a crafted terminfo database, causing a heap-based buffer overflow, resulting in an application crash, causing denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-05-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-19185 https://bugzilla.redhat.com/show_bug.cgi?id=2234924 https://www.cve.org/CVERecord?id=CVE-2020-19185 https://nvd.nist.gov/vuln/detail/CVE-2020-19185 https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-19185.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;W/DMqBRMDYVkVH3D67luGg==&#34;: {&#xA;      &#34;id&#34;: &#34;W/DMqBRMDYVkVH3D67luGg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-64118&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in node-tar, a Tar utility for Node.js. This vulnerability allows a local attacker to potentially disclose sensitive information. When the .t (or .list) function is used with { sync: true } to read tar entry contents, and the tar file is concurrently modified on disk to a smaller size, the function may return uninitialized memory contents. This could lead to the exposure of arbitrary data.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-30T17:50:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-64118 https://bugzilla.redhat.com/show_bug.cgi?id=2407440 https://www.cve.org/CVERecord?id=CVE-2025-64118 https://nvd.nist.gov/vuln/detail/CVE-2025-64118 https://github.com/isaacs/node-tar/commit/5330eb04bc43014f216e5c271b40d5c00d45224d https://github.com/isaacs/node-tar/issues/445 https://github.com/isaacs/node-tar/pull/446 https://github.com/isaacs/node-tar/security/advisories/GHSA-29xp-372q-xqph https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-64118.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;W/d4trZ7jb2yxjrq4cNOWA==&#34;: {&#xA;      &#34;id&#34;: &#34;W/d4trZ7jb2yxjrq4cNOWA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3219&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in GnuPG. GnuPG can spin on a relatively small input by crafting a public key with thousands of signatures attached and compressed down to a few kilobytes. This issue can potentially cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-09-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://www.cve.org/CVERecord?id=CVE-2022-3219 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://dev.gnupg.org/D556 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3219.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WGvgNwrW2u5APZcidQ6v1Q==&#34;: {&#xA;      &#34;id&#34;: &#34;WGvgNwrW2u5APZcidQ6v1Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27456&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in util-linux. When an /etc/fstab entry is configured with the user,loop options, the `mount` program checks the file path with user permissions but later opens it with root privileges. This creates a brief Time-of-Check-Time-of-Use (TOCTOU) window where an attacker can substitute the intended file with a malicious symbolic link. This allows a local unprivileged user to mount any root-owned file or block device that contains a valid filesystem, gaining full read access to its contents.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-03T21:23:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27456 https://bugzilla.redhat.com/show_bug.cgi?id=2454956 https://www.cve.org/CVERecord?id=CVE-2026-27456 https://nvd.nist.gov/vuln/detail/CVE-2026-27456 https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4 https://github.com/util-linux/util-linux/releases/tag/v2.41.4 https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27456.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;util-linux&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;WcChSpNAL6V9Xfxc9AqW7g==&#34;: {&#xA;      &#34;id&#34;: &#34;WcChSpNAL6V9Xfxc9AqW7g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15469&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15469 https://bugzilla.redhat.com/show_bug.cgi?id=2430378 https://www.cve.org/CVERecord?id=CVE-2025-15469 https://nvd.nist.gov/vuln/detail/CVE-2025-15469 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15469.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;X37PWFfcTFBuBxL2613UQg==&#34;: {&#xA;      &#34;id&#34;: &#34;X37PWFfcTFBuBxL2613UQg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4786&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the Python webbrowser.open() API. If a specially crafted URL containing \&#34;%action\&#34; is processed, an attacker could bypass a previous mitigation for CVE-2026-4519. This bypass allows for command injection into the underlying shell, potentially leading to arbitrary code execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-13T21:52:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4786 https://bugzilla.redhat.com/show_bug.cgi?id=2458049 https://www.cve.org/CVERecord?id=CVE-2026-4786 https://nvd.nist.gov/vuln/detail/CVE-2026-4786 https://github.com/python/cpython/issues/148169 https://github.com/python/cpython/pull/148170 https://mail.python.org/archives/list/security-announce@python.org/thread/JQDUNJVB4AQNTJECSUKOBDU3XCJIPSE5/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4786.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XBiy/XVR6SoThCkYUmkD1g==&#34;: {&#xA;      &#34;id&#34;: &#34;XBiy/XVR6SoThCkYUmkD1g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-33056&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tar-rs, a Rust library for reading and writing tar archives. When unpacking a crafted tar archive, an attacker can exploit a symbolic link vulnerability. By including a symlink followed by a directory with the same name, the library incorrectly applies file permissions to the symlink&#39;s target. This allows an attacker to modify the permissions of arbitrary directories outside the intended extraction location.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-20T07:11:10Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-33056 https://bugzilla.redhat.com/show_bug.cgi?id=2449490 https://www.cve.org/CVERecord?id=CVE-2026-33056 https://nvd.nist.gov/vuln/detail/CVE-2026-33056 https://github.com/alexcrichton/tar-rs/commit/17b1fd84e632071cb8eef9d3709bf347bd266446 https://github.com/alexcrichton/tar-rs/security/advisories/GHSA-j4xf-2g29-59ph https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-33056.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XXiaw1EwhFkuilI94EKiqQ==&#34;: {&#xA;      &#34;id&#34;: &#34;XXiaw1EwhFkuilI94EKiqQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5713&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python. A malicious Python process could exploit the \&#34;profiling.sampling\&#34; module and \&#34;asyncio introspection capabilities\&#34; to read and write memory addresses within a privileged process. This vulnerability occurs when the privileged process connects to the malicious process via its remote debugging feature, potentially leading to information disclosure and arbitrary code execution. Successful exploitation requires repeated connections, which may cause instability in the connecting process.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-14T15:11:51Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5713 https://bugzilla.redhat.com/show_bug.cgi?id=2458239 https://www.cve.org/CVERecord?id=CVE-2026-5713 https://nvd.nist.gov/vuln/detail/CVE-2026-5713 https://github.com/python/cpython/issues/148178 https://github.com/python/cpython/pull/148187 https://mail.python.org/archives/list/security-announce@python.org/thread/OG4RHARYSNIE22GGOMVMCRH76L5HKPLM/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5713.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XbpXfbeApuDuIKvY0/qWiA==&#34;: {&#xA;      &#34;id&#34;: &#34;XbpXfbeApuDuIKvY0/qWiA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3731&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libssh. A remote attacker could trigger an out-of-bounds read vulnerability in the SFTP Extension Name Handler by manipulating the `idx` argument in the `sftp_extensions_get_name` or `sftp_extensions_get_data` functions. This could lead to a Denial of Service (DoS), making the affected system unresponsive.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-08T10:32:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3731 https://bugzilla.redhat.com/show_bug.cgi?id=2445579 https://www.cve.org/CVERecord?id=CVE-2026-3731 https://nvd.nist.gov/vuln/detail/CVE-2026-3731 https://gitlab.com/libssh/libssh-mirror/-/commit/855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60 https://vuldb.com/?ctiid.349709 https://vuldb.com/?id.349709 https://vuldb.com/?submit.767120 https://www.libssh.org/files/0.12/libssh-0.12.0.tar.xz https://www.libssh.org/security/advisories/libssh-2026-sftp-extensions.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3731.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;XygysGe2kdlyCRQHM1fu3w==&#34;: {&#xA;      &#34;id&#34;: &#34;XygysGe2kdlyCRQHM1fu3w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5917&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in the libarchive library. This flaw involves an &#39;off-by-one&#39; miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation. This bug affects libarchive versions prior to 3.8.0.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5917 https://bugzilla.redhat.com/show_bug.cgi?id=2370874 https://www.cve.org/CVERecord?id=CVE-2025-5917 https://nvd.nist.gov/vuln/detail/CVE-2025-5917 https://github.com/libarchive/libarchive/pull/2588 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5917.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YiJlkUTKf0/7+ORZMmQ2cw==&#34;: {&#xA;      &#34;id&#34;: &#34;YiJlkUTKf0/7+ORZMmQ2cw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-25724&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libarchive package. Affected versions of libarchive do not check a strftime return value, which can lead to a denial of service or unspecified other impacts via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-25724 https://bugzilla.redhat.com/show_bug.cgi?id=2349221 https://www.cve.org/CVERecord?id=CVE-2025-25724 https://nvd.nist.gov/vuln/detail/CVE-2025-25724 https://gist.github.com/Ekkosun/a83870ce7f3b7813b9b462a395e8ad92 https://github.com/Ekkosun/pocs/blob/main/bsdtarbug https://github.com/libarchive/libarchive/blob/b439d586f53911c84be5e380445a8a259e19114c/tar/util.c#L751-L752 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-25724.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;YoCxZvEp16Bt9LDv+Ficeg==&#34;: {&#xA;      &#34;id&#34;: &#34;YoCxZvEp16Bt9LDv+Ficeg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-64506&#34;,&#xA;      &#34;description&#34;: &#34;A buffer over read flaw has been discovered in libpng. A heap buffer over-read vulnerability exists in libpng&#39;s png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-11-24T23:41:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-64506 https://bugzilla.redhat.com/show_bug.cgi?id=2416906 https://www.cve.org/CVERecord?id=CVE-2025-64506 https://nvd.nist.gov/vuln/detail/CVE-2025-64506 https://github.com/pnggroup/libpng/commit/2bd84c019c300b78e811743fbcddb67c9d9bf821 https://github.com/pnggroup/libpng/pull/749 https://github.com/pnggroup/libpng/security/advisories/GHSA-qpr4-xm66-hww6 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-64506.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZTGiJlkqcqrCLJSY/Sq8lA==&#34;: {&#xA;      &#34;id&#34;: &#34;ZTGiJlkqcqrCLJSY/Sq8lA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-19186&#34;,&#xA;      &#34;description&#34;: &#34;A flaw has been identified in the ncurses library. This issue occurs when processing a crafted terminfo database, causing a buffer over-read, resulting in an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-05-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-19186 https://bugzilla.redhat.com/show_bug.cgi?id=2234908 https://www.cve.org/CVERecord?id=CVE-2020-19186 https://nvd.nist.gov/vuln/detail/CVE-2020-19186 https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-19186.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZkEez7f24VNVhTaTCDhuEg==&#34;: {&#xA;      &#34;id&#34;: &#34;ZkEez7f24VNVhTaTCDhuEg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15468&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15468 https://bugzilla.redhat.com/show_bug.cgi?id=2430377 https://www.cve.org/CVERecord?id=CVE-2025-15468 https://nvd.nist.gov/vuln/detail/CVE-2025-15468 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15468.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZlxfTVb/4bi6yWQ+JLaOnw==&#34;: {&#xA;      &#34;id&#34;: &#34;ZlxfTVb/4bi6yWQ+JLaOnw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2297&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in CPython. This vulnerability allows a local user with low privileges to bypass security auditing mechanisms. The issue occurs because the SourcelessFileLoader component, responsible for handling older Python compiled files (.pyc), does not properly trigger system audit events. This oversight could enable malicious activities to go undetected, compromising the integrity of the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-04T22:10:43Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2297 https://bugzilla.redhat.com/show_bug.cgi?id=2444691 https://www.cve.org/CVERecord?id=CVE-2026-2297 https://nvd.nist.gov/vuln/detail/CVE-2026-2297 https://github.com/python/cpython/commit/482d6f8bdba9da3725d272e8bb4a2d25fb6a603e https://github.com/python/cpython/commit/a51b1b512de1d56b3714b65628a2eae2b07e535e https://github.com/python/cpython/commit/e58e9802b9bec5cdbf48fc9bf1da5f4fda482e86 https://github.com/python/cpython/issues/145506 https://github.com/python/cpython/pull/145507 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2297.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Znm2hdK/FULQhTTGTVX59Q==&#34;: {&#xA;      &#34;id&#34;: &#34;Znm2hdK/FULQhTTGTVX59Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3783&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an OAuth2 bearer token is used for an HTTP(S) transfer that redirects to a second URL, curl could unintentionally leak the token. This occurs if the second hostname has entries in the `.netrc` file, allowing the bearer token intended for the first host to be sent to the redirected host. This information disclosure could allow an attacker to gain unauthorized access.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:09:08Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3783 https://bugzilla.redhat.com/show_bug.cgi?id=2446450 https://www.cve.org/CVERecord?id=CVE-2026-3783 https://nvd.nist.gov/vuln/detail/CVE-2026-3783 http://www.openwall.com/lists/oss-security/2026/03/11/2 https://curl.se/docs/CVE-2026-3783.html https://curl.se/docs/CVE-2026-3783.json https://hackerone.com/reports/3583983 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3783.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;Zp9+pixFuNBueE2yO610gQ==&#34;: {&#xA;      &#34;id&#34;: &#34;Zp9+pixFuNBueE2yO610gQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-56433&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in shadow-utils. Affected versions of shadow-utils establish a default /etc/subuid behavior, for example, uid 100000 through 165535 for the first user account, that can conflict with the uids of users defined on locally administered networks. This issue potentially leads to account takeover by leveraging newuidmap for access to an NFS home directory or same-host resources for remote logins by these local network users.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-12-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-56433 https://bugzilla.redhat.com/show_bug.cgi?id=2334165 https://www.cve.org/CVERecord?id=CVE-2024-56433 https://nvd.nist.gov/vuln/detail/CVE-2024-56433 https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241 https://github.com/shadow-maint/shadow/issues/1157 https://github.com/shadow-maint/shadow/releases/tag/4.4 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-56433.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;shadow-utils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ZvX4VR3jvMBd1Wq+RxNTgg==&#34;: {&#xA;      &#34;id&#34;: &#34;ZvX4VR3jvMBd1Wq+RxNTgg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-35512&#34;,&#xA;      &#34;description&#34;: &#34;A use-after-free flaw was found in D-Bus when a system has multiple usernames sharing the same UID. When a set of policy rules references these usernames, D-Bus may free some memory in the heap, which is still used by data structures necessary for the other usernames sharing the UID, possibly leading to a crash or other undefined behaviors.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-06-30T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-35512 https://bugzilla.redhat.com/show_bug.cgi?id=1909101 https://www.cve.org/CVERecord?id=CVE-2020-35512 https://nvd.nist.gov/vuln/detail/CVE-2020-35512 https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-35512.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;dbus&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;a067YUjLHWzR99JNl/RtGQ==&#34;: {&#xA;      &#34;id&#34;: &#34;a067YUjLHWzR99JNl/RtGQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4598&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner&#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-29T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;avzu5SRbIjcduH4QdmZ1gg==&#34;: {&#xA;      &#34;id&#34;: &#34;avzu5SRbIjcduH4QdmZ1gg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0966&#34;,&#xA;      &#34;description&#34;: &#34;The API function `ssh_get_hexa()` is vulnerable, when 0-lenght\ninput is provided to this function. This function is used internally\nin `ssh_get_fingerprint_hash()` and `ssh_print_hexa()` (deprecated),\nwhich is vulnerable to the same input (length is provided by the\ncalling application).\n\nThe function is also used internally in the gssapi code for logging\nthe OIDs received by the server during GSSAPI authentication. This\ncould be triggered remotely, when the server allows GSSAPI authentication\nand logging verbosity is set at least to SSH_LOG_PACKET (3). This\ncould cause self-DoS of the per-connection daemon process.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-10T18:47:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0966 https://bugzilla.redhat.com/show_bug.cgi?id=2433121 https://www.cve.org/CVERecord?id=CVE-2026-0966 https://nvd.nist.gov/vuln/detail/CVE-2026-0966 https://www.libssh.org/2026/02/10/libssh-0-12-0-and-0-11-4-security-releases/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0966.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cCowLuOsLfTMmPFOoqUVww==&#34;: {&#xA;      &#34;id&#34;: &#34;cCowLuOsLfTMmPFOoqUVww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0397&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in Python. A defect was discovered in the Python “ssl” module where there is a memory race condition with the ssl.SSLContext methods “cert_store_stats()” and “get_ca_certs()”. The race condition can be triggered if the methods are called at the same time that certificates are loaded into the SSLContext, such as during the TLS handshake with a  configured certificate directory.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-06-17T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0397 https://bugzilla.redhat.com/show_bug.cgi?id=2301891 https://www.cve.org/CVERecord?id=CVE-2024-0397 https://nvd.nist.gov/vuln/detail/CVE-2024-0397 https://mail.python.org/archives/list/security-announce@python.org/thread/BMAK5BCGKYWNJOACVUSLUF6SFGBIM4VP/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0397.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cW+DgNrGAeRAwNB4wrDZhw==&#34;: {&#xA;      &#34;id&#34;: &#34;cW+DgNrGAeRAwNB4wrDZhw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22695&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a reference library for processing PNG (Portable Network Graphics) image files. A local attacker could exploit a heap buffer over-read vulnerability in the `png_image_finish_read` function by tricking a user into processing a specially crafted interlaced 16-bit PNG file with an 8-bit output format and non-minimal row stride. This could lead to a denial of service (DoS) and potentially information disclosure.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T22:55:40Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22695 https://bugzilla.redhat.com/show_bug.cgi?id=2428825 https://www.cve.org/CVERecord?id=CVE-2026-22695 https://nvd.nist.gov/vuln/detail/CVE-2026-22695 https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea https://github.com/pnggroup/libpng/commit/e4f7ad4ea2 https://github.com/pnggroup/libpng/issues/778 https://github.com/pnggroup/libpng/security/advisories/GHSA-mmq5-27w3-rxpp https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22695.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;cqYWiTibDLM7aibErMKang==&#34;: {&#xA;      &#34;id&#34;: &#34;cqYWiTibDLM7aibErMKang==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4437&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc (the GNU C Library). When an application uses the `gethostbyaddr` or `gethostbyaddr_r` functions with a `nsswitch.conf` configuration that specifies glibc&#39;s DNS backend, a remote attacker can send a specially crafted DNS (Domain Name System) response. This crafted response can cause the application to incorrectly interpret a non-answer section of the DNS response as a valid answer, leading to potential misbehavior or incorrect information processing.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-20T19:59:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4437 https://bugzilla.redhat.com/show_bug.cgi?id=2449777 https://www.cve.org/CVERecord?id=CVE-2026-4437 https://nvd.nist.gov/vuln/detail/CVE-2026-4437 https://sourceware.org/bugzilla/show_bug.cgi?id=34014 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4437.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;crmilTSJ/pTSPBKY9EJmZg==&#34;: {&#xA;      &#34;id&#34;: &#34;crmilTSJ/pTSPBKY9EJmZg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14524&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an OAuth2 (Open Authorization) bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a different scheme like IMAP, LDAP, POP3, or SMTP, curl might incorrectly pass the bearer token to the new target host. This could lead to information disclosure, where sensitive authentication tokens are exposed to unintended recipients.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14524 https://bugzilla.redhat.com/show_bug.cgi?id=2426407 https://www.cve.org/CVERecord?id=CVE-2025-14524 https://nvd.nist.gov/vuln/detail/CVE-2025-14524 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14524.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eCNdMtt9JN2Rrb8I23NIsA==&#34;: {&#xA;      &#34;id&#34;: &#34;eCNdMtt9JN2Rrb8I23NIsA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34990&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenPrinting CUPS. A local unprivileged user can exploit this vulnerability by coercing the `cupsd` service to authenticate to an attacker-controlled Internet Printing Protocol (IPP) service. This allows the user to create a persistent printer queue that can overwrite arbitrary files with root privileges. Successful exploitation can lead to privilege escalation and arbitrary root command execution.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-03T21:14:09Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34990 https://bugzilla.redhat.com/show_bug.cgi?id=2454947 https://www.cve.org/CVERecord?id=CVE-2026-34990 https://nvd.nist.gov/vuln/detail/CVE-2026-34990 https://github.com/OpenPrinting/cups/security/advisories/GHSA-c54j-2vqw-wpwp https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34990.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eohUFw28jV3sGLZE2CBPXA==&#34;: {&#xA;      &#34;id&#34;: &#34;eohUFw28jV3sGLZE2CBPXA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4878&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in libssh, where an uninitialized variable exists under certain conditions in the privatekey_from_file() function. This flaw can be triggered if the file specified by the filename doesn&#39;t exist and may lead to possible signing failures or heap corruption.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4878 https://bugzilla.redhat.com/show_bug.cgi?id=2376184 https://www.cve.org/CVERecord?id=CVE-2025-4878 https://nvd.nist.gov/vuln/detail/CVE-2025-4878 https://git.libssh.org/projects/libssh.git/commit/?id=697650caa97eaf7623924c75f9fcfec6dd423cd1 https://git.libssh.org/projects/libssh.git/commit/?id=b35ee876adc92a208d47194772e99f9c71e0bedb https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4878.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;eqoqeJN8gMUINJLH2PXP7g==&#34;: {&#xA;      &#34;id&#34;: &#34;eqoqeJN8gMUINJLH2PXP7g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-1000654&#34;,&#xA;      &#34;description&#34;: &#34;GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.&#34;,&#xA;      &#34;issued&#34;: &#34;2018-08-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2018-1000654 https://bugzilla.redhat.com/show_bug.cgi?id=1621972 https://www.cve.org/CVERecord?id=CVE-2018-1000654 https://nvd.nist.gov/vuln/detail/CVE-2018-1000654 https://security.access.redhat.com/data/csaf/v2/vex/2018/cve-2018-1000654.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fXpWtuXNPi3tb2edhk37bw==&#34;: {&#xA;      &#34;id&#34;: &#34;fXpWtuXNPi3tb2edhk37bw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2236&#34;,&#xA;      &#34;description&#34;: &#34;A timing-based side-channel flaw was found in libgcrypt&#39;s RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-03-06T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2236 https://bugzilla.redhat.com/show_bug.cgi?id=2245218 https://www.cve.org/CVERecord?id=CVE-2024-2236 https://nvd.nist.gov/vuln/detail/CVE-2024-2236 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2236.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fayrPya6DVXP9weWvA6obQ==&#34;: {&#xA;      &#34;id&#34;: &#34;fayrPya6DVXP9weWvA6obQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-7264&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcurl, where libcurl&#39;s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the *time fraction*, leading to a `strlen()` performed on a pointer to a heap buffer area that is not purposely NULL terminated.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-07-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-7264 https://bugzilla.redhat.com/show_bug.cgi?id=2301888 https://www.cve.org/CVERecord?id=CVE-2024-7264 https://nvd.nist.gov/vuln/detail/CVE-2024-7264 https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7264.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;fvGjL9hw9hDQockMTb7lrA==&#34;: {&#xA;      &#34;id&#34;: &#34;fvGjL9hw9hDQockMTb7lrA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-4209&#34;,&#xA;      &#34;description&#34;: &#34;A NULL pointer dereference flaw was found in GnuTLS. As Nettle&#39;s hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.&#34;,&#xA;      &#34;issued&#34;: &#34;2021-12-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-4209 https://bugzilla.redhat.com/show_bug.cgi?id=2044156 https://www.cve.org/CVERecord?id=CVE-2021-4209 https://nvd.nist.gov/vuln/detail/CVE-2021-4209 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-4209.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnutls&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gaFOKxy9D9KR/Iyd+kDZoA==&#34;: {&#xA;      &#34;id&#34;: &#34;gaFOKxy9D9KR/Iyd+kDZoA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-50182&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in urllib3. The library fails to properly validate redirect URLs, allowing an attacker to manipulate redirect chains when used in environments like Pyodide utilizing the JavaScript Fetch API. This lack of validation can enable a remote attacker to control the redirect destination, leading to arbitrary URL redirection. Consequently, an attacker can redirect users to malicious websites. This \nvulnerability stems from a failure to constrain the redirect target.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-19T01:42:44Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-50182 https://bugzilla.redhat.com/show_bug.cgi?id=2373800 https://www.cve.org/CVERecord?id=CVE-2025-50182 https://nvd.nist.gov/vuln/detail/CVE-2025-50182 https://github.com/urllib3/urllib3/commit/7eb4a2aafe49a279c29b6d1f0ed0f42e9736194f https://github.com/urllib3/urllib3/security/advisories/GHSA-48p4-8xcf-vxj5 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-50182.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;gagftKXuSuh9pi4dRu9yPQ==&#34;: {&#xA;      &#34;id&#34;: &#34;gagftKXuSuh9pi4dRu9yPQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-2511&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A malicious client can trigger an uncontrolled memory consumption, resulting in a Denial of Service. This issue occurs due to OpenSSL&#39;s TLSv1.3 session cache going into an incorrect state, leading to it failing to flush properly as it fills. OpenSSL must be configured with the non-default SSL_OP_NO_TICKET option enabled to be vulnerable. This issue only affects TLSv1.3 servers, while TLS clients are not affected.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-04-08T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-2511 https://bugzilla.redhat.com/show_bug.cgi?id=2274020 https://www.cve.org/CVERecord?id=CVE-2024-2511 https://nvd.nist.gov/vuln/detail/CVE-2024-2511 https://www.openssl.org/news/vulnerabilities.html https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-2511.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;h6rS2s3xilGaG0a+pIjl8A==&#34;: {&#xA;      &#34;id&#34;: &#34;h6rS2s3xilGaG0a+pIjl8A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3644&#34;,&#xA;      &#34;description&#34;: &#34;A control character validation flaw has been discovered in the Python http.cookie module. The Morsel.update(), |= operator, and unpickling paths were not patched to resolve  CVE-2026-0672, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-16T17:37:31Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3644 https://bugzilla.redhat.com/show_bug.cgi?id=2448168 https://www.cve.org/CVERecord?id=CVE-2026-3644 https://nvd.nist.gov/vuln/detail/CVE-2026-3644 https://github.com/python/cpython/commit/57e88c1cf95e1481b94ae57abe1010469d47a6b4 https://github.com/python/cpython/issues/145599 https://github.com/python/cpython/pull/145600 https://mail.python.org/archives/list/security-announce@python.org/thread/H6CADMBCDRFGWCMOXWUIHFJNV43GABJ7/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3644.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hfBpyVezkUAf98QWnlvzIA==&#34;: {&#xA;      &#34;id&#34;: &#34;hfBpyVezkUAf98QWnlvzIA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34743&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in XZ Utils. When the `lzma_index_decoder()` function processes an empty index, and a subsequent `lzma_index_append()` operation is performed, insufficient memory is allocated. This can lead to a buffer overflow, potentially causing a denial of service (DoS) for affected systems.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-02T18:36:37Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34743 https://bugzilla.redhat.com/show_bug.cgi?id=2454589 https://www.cve.org/CVERecord?id=CVE-2026-34743 https://nvd.nist.gov/vuln/detail/CVE-2026-34743 https://github.com/tukaani-project/xz/commit/c8c22869e780ff57c96b46939c3d79ff99395f87 https://github.com/tukaani-project/xz/releases/tag/v5.8.3 https://github.com/tukaani-project/xz/security/advisories/GHSA-x872-m794-cxhv https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34743.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;xz&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;hkP7fdNBNcMv5alTtw0c+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;hkP7fdNBNcMv5alTtw0c+Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-13151&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libtasn1. A remote attacker could exploit a stack-based buffer overflow vulnerability in the `asn1_expend_octet_string` function. This occurs due to a failure in validating the size of input data. Successful exploitation can lead to a Denial of Service (DoS) condition, making the affected system or application unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T21:14:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-13151 https://bugzilla.redhat.com/show_bug.cgi?id=2427698 https://www.cve.org/CVERecord?id=CVE-2025-13151 https://nvd.nist.gov/vuln/detail/CVE-2025-13151 https://gitlab.com/gnutls/libtasn1 https://gitlab.com/gnutls/libtasn1/-/merge_requests/121 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-13151.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libtasn1&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ho4M6//kfDyE5kZ9fbpV0g==&#34;: {&#xA;      &#34;id&#34;: &#34;ho4M6//kfDyE5kZ9fbpV0g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14819&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libcurl. When handling secure connections (TLS) and reusing connection settings, libcurl could incorrectly apply a cached security setting related to certificate chain validation. This could allow libcurl to accept a server&#39;s security certificate that it should have otherwise rejected, potentially compromising the integrity of the secure connection.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14819 https://bugzilla.redhat.com/show_bug.cgi?id=2426408 https://www.cve.org/CVERecord?id=CVE-2025-14819 https://nvd.nist.gov/vuln/detail/CVE-2025-14819 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14819.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;iEGZHZXt8HWPSM5eJesddQ==&#34;: {&#xA;      &#34;id&#34;: &#34;iEGZHZXt8HWPSM5eJesddQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-7039&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-7039 https://bugzilla.redhat.com/show_bug.cgi?id=2392423 https://www.cve.org/CVERecord?id=CVE-2025-7039 https://nvd.nist.gov/vuln/detail/CVE-2025-7039 https://gitlab.gnome.org/GNOME/glib/-/issues/3716 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-7039.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;icj6a8bc4dYK/DJNvkU0+A==&#34;: {&#xA;      &#34;id&#34;: &#34;icj6a8bc4dYK/DJNvkU0+A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-41409&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in PCRE2, where it is susceptible to an integer overflow vulnerability triggered by a negative repeat value in the pcre2test subject line that causes infinite looping. This flaw allows a remote attacker to pass specially crafted data to the application, initiating an integer overflow and executing a denial of service (DoS) attack.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-07-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-41409 https://bugzilla.redhat.com/show_bug.cgi?id=2260814 https://www.cve.org/CVERecord?id=CVE-2022-41409 https://nvd.nist.gov/vuln/detail/CVE-2022-41409 https://github.com/PCRE2Project/pcre2/commit/94e1c001761373b7d9450768aa15d04c25547a35 https://github.com/PCRE2Project/pcre2/issues/141 https://github.com/advisories/GHSA-4qfx-v7wh-3q4j https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41409.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;pcre2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ieASPdYzGxWke8nZZhE02Q==&#34;: {&#xA;      &#34;id&#34;: &#34;ieASPdYzGxWke8nZZhE02Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2018-20657&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the demangle_template function in GNU libiberty, as distributed in GNU Binutils, where a memory leak could occur, a specially crafted file could cause the application to consume excessive memory, potentially leading to a crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2018-12-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2018-20657 https://bugzilla.redhat.com/show_bug.cgi?id=1664708 https://www.cve.org/CVERecord?id=CVE-2018-20657 https://nvd.nist.gov/vuln/detail/CVE-2018-20657 https://security.access.redhat.com/data/csaf/v2/vex/2018/cve-2018-20657.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;j1KIfSLRyAo+5FqbDzJbtg==&#34;: {&#xA;      &#34;id&#34;: &#34;j1KIfSLRyAo+5FqbDzJbtg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5278&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GNU Coreutils. The sort utility&#39;s begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5278 https://bugzilla.redhat.com/show_bug.cgi?id=2368764 https://www.cve.org/CVERecord?id=CVE-2025-5278 https://nvd.nist.gov/vuln/detail/CVE-2025-5278 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5278.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;coreutils&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jguV9kU5iHC5V/cF3+b/tg==&#34;: {&#xA;      &#34;id&#34;: &#34;jguV9kU5iHC5V/cF3+b/tg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-3360&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-3360 https://bugzilla.redhat.com/show_bug.cgi?id=2357754 https://www.cve.org/CVERecord?id=CVE-2025-3360 https://nvd.nist.gov/vuln/detail/CVE-2025-3360 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3360.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;jw1ZiDut5Ot+DyVFjCrixg==&#34;: {&#xA;      &#34;id&#34;: &#34;jw1ZiDut5Ot+DyVFjCrixg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2020-19188&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the ncurses library. This issue occurs when processing a crafted terminfo database, causing a stack-based buffer overflow, resulting in an application crash, leading to a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-05-03T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2020-19188 https://bugzilla.redhat.com/show_bug.cgi?id=2234913 https://www.cve.org/CVERecord?id=CVE-2020-19188 https://nvd.nist.gov/vuln/detail/CVE-2020-19188 https://security.access.redhat.com/data/csaf/v2/vex/2020/cve-2020-19188.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kCsMurCi7F77HxJoLqd9jA==&#34;: {&#xA;      &#34;id&#34;: &#34;kCsMurCi7F77HxJoLqd9jA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34978&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenPrinting CUPS. A remote attacker can exploit a path traversal vulnerability in the RSS notifier by manipulating the `notify-recipient-uri`. This allows writing arbitrary RSS XML data to sensitive files outside the intended directory. This can lead to a denial of service (DoS) by corrupting critical system files, such as the job cache, causing the scheduler to fail and previously queued jobs to disappear.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-03T21:15:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34978 https://bugzilla.redhat.com/show_bug.cgi?id=2454957 https://www.cve.org/CVERecord?id=CVE-2026-34978 https://nvd.nist.gov/vuln/detail/CVE-2026-34978 https://github.com/OpenPrinting/cups/security/advisories/GHSA-f53q-7mxp-9gcr https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34978.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;cups&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;kYYDrncBncmKkmFnSd5t3w==&#34;: {&#xA;      &#34;id&#34;: &#34;kYYDrncBncmKkmFnSd5t3w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2017-6519&#34;,&#xA;      &#34;description&#34;: &#34;avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive  information from the responding device via port-5353 UDP packets.  NOTE: this may overlap CVE-2015-2809.&#34;,&#xA;      &#34;issued&#34;: &#34;2015-03-31T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2017-6519 https://bugzilla.redhat.com/show_bug.cgi?id=1426712 https://www.cve.org/CVERecord?id=CVE-2017-6519 https://nvd.nist.gov/vuln/detail/CVE-2017-6519 https://www.kb.cert.org/vuls/id/550620 https://security.access.redhat.com/data/csaf/v2/vex/2017/cve-2017-6519.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;klCkJxhhNVG564GOUQMh+Q==&#34;: {&#xA;      &#34;id&#34;: &#34;klCkJxhhNVG564GOUQMh+Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5745&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. A NULL pointer dereference vulnerability exists in the ACL parsing logic, specifically within the archive_acl_from_text_nl() function. When processing a malformed ACL string (such as a bare \&#34;d\&#34; or \&#34;default\&#34; tag without subsequent fields), the function fails to perform adequate validation before advancing the pointer. An attacker can exploit this by providing a maliciously crafted archive, causing an application utilizing the libarchive API (such as bsdtar) to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5745 https://bugzilla.redhat.com/show_bug.cgi?id=2455921 https://www.cve.org/CVERecord?id=CVE-2026-5745 https://nvd.nist.gov/vuln/detail/CVE-2026-5745 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5745.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;m8ueKfgkaYIYTU+xtIQcwA==&#34;: {&#xA;      &#34;id&#34;: &#34;m8ueKfgkaYIYTU+xtIQcwA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-3857&#34;,&#xA;      &#34;description&#34;: &#34;[REJECTED CVE] A issue has been identified with libpng in png_setup_paeth_row() function. A crafted PNG image from a n attacker can lead to a segmentation fault and Denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-11-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-3857 https://bugzilla.redhat.com/show_bug.cgi?id=2142600 https://www.cve.org/CVERecord?id=CVE-2022-3857 https://nvd.nist.gov/vuln/detail/CVE-2022-3857 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3857.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mRazAXjBcgFrTolNDZHDsA==&#34;: {&#xA;      &#34;id&#34;: &#34;mRazAXjBcgFrTolNDZHDsA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6069&#34;,&#xA;      &#34;description&#34;: &#34;A denial-of-service (DoS) vulnerability has been discovered in Python&#39;s html.parser.HTMLParser class. When processing specially malformed HTML input, the parsing runtime can become quadratic with respect to the input size. This significantly increased processing time can lead to excessive resource consumption, ultimately causing a denial-of-service condition in applications that rely on this parser.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-17T13:39:46Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6069 https://bugzilla.redhat.com/show_bug.cgi?id=2373234 https://www.cve.org/CVERecord?id=CVE-2025-6069 https://nvd.nist.gov/vuln/detail/CVE-2025-6069 https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949 https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41 https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b https://github.com/python/cpython/issues/135462 https://github.com/python/cpython/pull/135464 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6069.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mVT54HSCxoOy6IF9Noa/Zw==&#34;: {&#xA;      &#34;id&#34;: &#34;mVT54HSCxoOy6IF9Noa/Zw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-6100&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Python&#39;s decompression modules, including `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile`. This vulnerability, a use-after-free, can occur if a program attempts to re-use a decompression object after a memory allocation error, especially when the system is experiencing high memory usage. Exploitation of this flaw could potentially allow an attacker to execute arbitrary code or access sensitive data. The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-13T17:15:47Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-6100 https://bugzilla.redhat.com/show_bug.cgi?id=2457932 https://www.cve.org/CVERecord?id=CVE-2026-6100 https://nvd.nist.gov/vuln/detail/CVE-2026-6100 https://github.com/python/cpython/commit/6a5f79c8d7bbf22b083b240910c7a8781a59437d https://github.com/python/cpython/commit/8fc66aef6d7b3ae58f43f5c66f9366cc8cbbfcd2 https://github.com/python/cpython/commit/c3cf71c3366fe49acb776a639405c0eea6169c20 https://github.com/python/cpython/issues/148395 https://github.com/python/cpython/pull/148396 https://mail.python.org/archives/list/security-announce@python.org/thread/HTWB2Z6KT5QQX4RYEZAFININDHNOSIF3/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-6100.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;High&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;mouoWVvs12H8FynnB5qIsQ==&#34;: {&#xA;      &#34;id&#34;: &#34;mouoWVvs12H8FynnB5qIsQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-14250&#34;,&#xA;      &#34;description&#34;: &#34;This issue resides on libiberty code, a part of binutils, distributed with different versions of RH software. The vulnerability is triggered when the shstrndx (Section Header String Table Index) is zero in the ELF file. This specific condition leads to the integer overflow and subsequent buffer overflow.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-08-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-14250 https://bugzilla.redhat.com/show_bug.cgi?id=1739490 https://www.cve.org/CVERecord?id=CVE-2019-14250 https://nvd.nist.gov/vuln/detail/CVE-2019-14250 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-14250.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;n83jaRl/T6kiaoMyWtX8xw==&#34;: {&#xA;      &#34;id&#34;: &#34;n83jaRl/T6kiaoMyWtX8xw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-24032&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in zstd. While the final file mode is reflective of the input file, when compressing or uncompressing, the file can temporarily gain greater permissions than the input and potentially leading to security issues (especially if large files are being handled).&#34;,&#xA;      &#34;issued&#34;: &#34;2021-02-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-24032 https://bugzilla.redhat.com/show_bug.cgi?id=1928090 https://www.cve.org/CVERecord?id=CVE-2021-24032 https://nvd.nist.gov/vuln/detail/CVE-2021-24032 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-24032.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zstd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;nYtstWEUOCTbjAlmYOKURA==&#34;: {&#xA;      &#34;id&#34;: &#34;nYtstWEUOCTbjAlmYOKURA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-4516&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability has been identified in CPython&#39;s bytes.decode() function when used with the \&#34;unicode_escape\&#34; encoding and the \&#34;ignore\&#34; or \&#34;replace\&#34; error handling modes. This flaw can result in the incorrect decoding of byte strings. While this may not directly lead to traditional security breaches like data exfiltration, the resulting unexpected program behavior could introduce instability, logic errors, or unintended side effects within applications that rely on this specific decoding functionality.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-05-15T13:29:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-4516 https://bugzilla.redhat.com/show_bug.cgi?id=2366509 https://www.cve.org/CVERecord?id=CVE-2025-4516 https://nvd.nist.gov/vuln/detail/CVE-2025-4516 https://github.com/python/cpython/commit/69b4387f78f413e8c47572a85b3478c47eba8142 https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e https://github.com/python/cpython/issues/133767 https://github.com/python/cpython/pull/129648 https://mail.python.org/archives/list/security-announce@python.org/thread/L75IPBBTSCYEF56I2M4KIW353BB3AY74/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4516.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ngbKDtxhn33NKWC2lhOQNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ngbKDtxhn33NKWC2lhOQNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1485&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Glib&#39;s content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1485 https://bugzilla.redhat.com/show_bug.cgi?id=2433325 https://www.cve.org/CVERecord?id=CVE-2026-1485 https://nvd.nist.gov/vuln/detail/CVE-2026-1485 https://gitlab.gnome.org/GNOME/glib/-/issues/3871 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1485.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;npBrFSWnZYxq9cizdfDfCQ==&#34;: {&#xA;      &#34;id&#34;: &#34;npBrFSWnZYxq9cizdfDfCQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1489&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1489 https://bugzilla.redhat.com/show_bug.cgi?id=2433348 https://www.cve.org/CVERecord?id=CVE-2026-1489 https://nvd.nist.gov/vuln/detail/CVE-2026-1489 https://gitlab.gnome.org/GNOME/glib/-/issues/3872 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1489.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;npQpPXYG8xMJ1LRSVSnKGA==&#34;: {&#xA;      &#34;id&#34;: &#34;npQpPXYG8xMJ1LRSVSnKGA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8114&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libssh, a library that implements the SSH protocol. When calculating the session ID during the key exchange (KEX) process, an allocation failure in cryptographic functions may lead to a NULL pointer dereference. This issue can cause the client or server to crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-07-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8114 https://bugzilla.redhat.com/show_bug.cgi?id=2383220 https://www.cve.org/CVERecord?id=CVE-2025-8114 https://nvd.nist.gov/vuln/detail/CVE-2025-8114 https://git.libssh.org/projects/libssh.git/commit/?id=53ac23ded4cb2c5463f6c4cd1525331bd578812d https://git.libssh.org/projects/libssh.git/commit/?id=65f363c9 https://www.libssh.org/security/advisories/CVE-2025-8114.txt https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8114.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;p2qAiuM4AsdQ5J4fBWvbBA==&#34;: {&#xA;      &#34;id&#34;: &#34;p2qAiuM4AsdQ5J4fBWvbBA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14512&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib&#39;s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-12-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14512 https://bugzilla.redhat.com/show_bug.cgi?id=2421339 https://www.cve.org/CVERecord?id=CVE-2025-14512 https://nvd.nist.gov/vuln/detail/CVE-2025-14512 https://gitlab.gnome.org/GNOME/glib/-/issues/3845 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14512.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;pjb5LKdJAfqIzj4N6YBwUQ==&#34;: {&#xA;      &#34;id&#34;: &#34;pjb5LKdJAfqIzj4N6YBwUQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-11053&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. A logic error when processing credentials from the .netrc file while performing redirects allows the transfer of credentials from the original host to the followed-to host under certain circumstances, leaking the credentials to the followed-to host.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-12-11T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-11053 https://bugzilla.redhat.com/show_bug.cgi?id=2331191 https://www.cve.org/CVERecord?id=CVE-2024-11053 https://nvd.nist.gov/vuln/detail/CVE-2024-11053 https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-11053.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qC/lM94bJkHuTCcx6Z47mQ==&#34;: {&#xA;      &#34;id&#34;: &#34;qC/lM94bJkHuTCcx6Z47mQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32778&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat. This vulnerability allows an attacker to trigger a NULL pointer dereference in the `setContext` function. This occurs when the system attempts to retry an operation after an out-of-memory condition, which can lead to a Denial of Service (DoS) for the affected application.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-16T07:02:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32778 https://bugzilla.redhat.com/show_bug.cgi?id=2447885 https://www.cve.org/CVERecord?id=CVE-2026-32778 https://nvd.nist.gov/vuln/detail/CVE-2026-32778 https://github.com/libexpat/libexpat/pull/1159 https://github.com/libexpat/libexpat/pull/1163 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32778.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qXNASosSuCsudML1MqXPjw==&#34;: {&#xA;      &#34;id&#34;: &#34;qXNASosSuCsudML1MqXPjw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-27534&#34;,&#xA;      &#34;description&#34;: &#34;A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.&#34;,&#xA;      &#34;issued&#34;: &#34;2023-03-20T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-27534 https://bugzilla.redhat.com/show_bug.cgi?id=2179069 https://www.cve.org/CVERecord?id=CVE-2023-27534 https://nvd.nist.gov/vuln/detail/CVE-2023-27534 https://curl.se/docs/CVE-2023-27534.html https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-27534.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;qv1CBAIhzNsoWe8hSWlF1g==&#34;: {&#xA;      &#34;id&#34;: &#34;qv1CBAIhzNsoWe8hSWlF1g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28390&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. A remote attacker could exploit this vulnerability by sending a specially crafted Cryptographic Message Syntax (CMS) EnvelopedData message. During the processing of a KeyTransportRecipientInfo with RSA-OAEP encryption, the system attempts to access an optional parameter field without first verifying its presence. This leads to a NULL pointer dereference, which can cause applications processing the attacker-controlled CMS data to crash, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T22:00:54Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28390 https://bugzilla.redhat.com/show_bug.cgi?id=2456314 https://www.cve.org/CVERecord?id=CVE-2026-28390 https://nvd.nist.gov/vuln/detail/CVE-2026-28390 https://github.com/openssl/openssl/commit/01194a8f1941115cd0383bfa91c736dd3993c8bc https://github.com/openssl/openssl/commit/2e39b7a6993be445fddb9fbce316fa756e0397b6 https://github.com/openssl/openssl/commit/af2a5fecd3e71a29e7568f9c1453dec5cebbaff4 https://github.com/openssl/openssl/commit/ea7b4ea4f9f853521ba34830cbcadc970d2e0788 https://github.com/openssl/openssl/commit/fd2f1a6cf53b9ceeca723a001aa4b825d7c7ee75 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28390.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rCI1GSL47zJlliQotxXM4Q==&#34;: {&#xA;      &#34;id&#34;: &#34;rCI1GSL47zJlliQotxXM4Q==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-2673&#34;,&#xA;      &#34;description&#34;: &#34;A key group selection preference flaw has been discovered in OpenSSL. An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the \&#34;DEFAULT\&#34; keyword. A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client&#39;s initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-13T13:23:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-2673 https://bugzilla.redhat.com/show_bug.cgi?id=2447327 https://www.cve.org/CVERecord?id=CVE-2026-2673 https://nvd.nist.gov/vuln/detail/CVE-2026-2673 https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34 https://openssl-library.org/news/secadv/20260313.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-2673.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rEd6JdG2xx5NZ9bcsFRNpw==&#34;: {&#xA;      &#34;id&#34;: &#34;rEd6JdG2xx5NZ9bcsFRNpw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-28388&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. When processing a malformed delta Certificate Revocation List (CRL) that lacks a required CRL Number extension, a NULL pointer dereference can occur. This vulnerability can be exploited by a remote attacker who provides a specially crafted delta CRL to an application that has delta CRL processing enabled, leading to a Denial of Service (DoS) for the application.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-28388 https://bugzilla.redhat.com/show_bug.cgi?id=2451097 https://www.cve.org/CVERecord?id=CVE-2026-28388 https://nvd.nist.gov/vuln/detail/CVE-2026-28388 https://openssl-library.org/news/secadv/20260407.txt https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-28388.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rEg00U8+//igCt+0+QBUhA==&#34;: {&#xA;      &#34;id&#34;: &#34;rEg00U8+//igCt+0+QBUhA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-50495&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability was found in the NCurses package, where a segmentation fault may be triggered through _nc_wrap_entry().&#34;,&#xA;      &#34;issued&#34;: &#34;2023-12-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-50495 https://bugzilla.redhat.com/show_bug.cgi?id=2254244 https://www.cve.org/CVERecord?id=CVE-2023-50495 https://nvd.nist.gov/vuln/detail/CVE-2023-50495 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-50495.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rVgBV65FWtFg3jitEqotFA==&#34;: {&#xA;      &#34;id&#34;: &#34;rVgBV65FWtFg3jitEqotFA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2024-0727&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. The optional ContentInfo fields can be set to null, even if the \&#34;type\&#34; is a valid value, which can lead to a null dereference error that may cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2024-01-22T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2024-0727 https://bugzilla.redhat.com/show_bug.cgi?id=2259944 https://www.cve.org/CVERecord?id=CVE-2024-0727 https://nvd.nist.gov/vuln/detail/CVE-2024-0727 https://github.com/openssl/openssl/pull/23362 https://www.openssl.org/news/secadv/20240125.txt https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0727.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;rfyVleP0iFAaKAccoWyLNQ==&#34;: {&#xA;      &#34;id&#34;: &#34;rfyVleP0iFAaKAccoWyLNQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-3805&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When handling a second Server Message Block (SMB) request to the same host, curl incorrectly accesses memory that has already been freed. This memory corruption vulnerability, known as a use-after-free, could allow a remote attacker to potentially execute arbitrary code or cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:09:37Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-3805 https://bugzilla.redhat.com/show_bug.cgi?id=2446451 https://www.cve.org/CVERecord?id=CVE-2026-3805 https://nvd.nist.gov/vuln/detail/CVE-2026-3805 http://www.openwall.com/lists/oss-security/2026/03/11/4 https://curl.se/docs/CVE-2026-3805.html https://curl.se/docs/CVE-2026-3805.json https://hackerone.com/reports/3591944 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-3805.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;ruDQdx7OmIsgMCpioWbqOQ==&#34;: {&#xA;      &#34;id&#34;: &#34;ruDQdx7OmIsgMCpioWbqOQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-5351&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys into serialized formats. During error handling, a memory structure is freed but not cleared, leading to a potential double free issue if an additional failure occurs later in the function. This condition may result in heap corruption or application instability in low-memory scenarios, posing a risk to system reliability where key export operations are performed.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-06-24T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-5351 https://bugzilla.redhat.com/show_bug.cgi?id=2369367 https://www.cve.org/CVERecord?id=CVE-2025-5351 https://nvd.nist.gov/vuln/detail/CVE-2025-5351 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5351.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;s1kzjy+cDztHEcgHrl7kHQ==&#34;: {&#xA;      &#34;id&#34;: &#34;s1kzjy+cDztHEcgHrl7kHQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-22801&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libpng, a reference library for PNG (Portable Network Graphics) raster image files. An integer truncation vulnerability exists in the png_write_image_16bit and png_write_image_8bit simplified write API functions. A local attacker could exploit this flaw by providing a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes, leading to a heap buffer over-read. This can result in information disclosure or a denial of service (DoS) to the system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T22:57:58Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-22801 https://bugzilla.redhat.com/show_bug.cgi?id=2428824 https://www.cve.org/CVERecord?id=CVE-2026-22801 https://nvd.nist.gov/vuln/detail/CVE-2026-22801 https://github.com/pnggroup/libpng/security/advisories/GHSA-vgjq-8cw5-ggw8 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-22801.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sExC9WXn4M01POjg0haQrA==&#34;: {&#xA;      &#34;id&#34;: &#34;sExC9WXn4M01POjg0haQrA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-34933&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Avahi. An unprivileged local user can exploit this vulnerability by sending a D-Bus method call with conflicting publish flags. This can lead to a denial of service (DoS) by crashing the avahi-daemon, making the service unavailable.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-03T22:43:26Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-34933 https://bugzilla.redhat.com/show_bug.cgi?id=2454978 https://www.cve.org/CVERecord?id=CVE-2026-34933 https://nvd.nist.gov/vuln/detail/CVE-2026-34933 https://github.com/avahi/avahi/commit/625ca0fac19229f6dfa3a6c6b698ae657187e50c https://github.com/avahi/avahi/pull/891 https://github.com/avahi/avahi/security/advisories/GHSA-w65r-6gxh-vhvc https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-34933.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sGwL9v57mGx7f18qBkIacA==&#34;: {&#xA;      &#34;id&#34;: &#34;sGwL9v57mGx7f18qBkIacA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-6075&#34;,&#xA;      &#34;description&#34;: &#34;A vulnerability in Python’s os.path.expandvars() function that can cause performance degradation. When processing specially crafted, user-controlled input with nested environment variable patterns, the function exhibits quadratic time complexity, potentially leading to excessive CPU usage and denial of service (DoS) conditions. No code execution or data exposure occurs, so the impact is limited to performance slowdown.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-10-31T16:41:34Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-6075 https://bugzilla.redhat.com/show_bug.cgi?id=2408891 https://www.cve.org/CVERecord?id=CVE-2025-6075 https://nvd.nist.gov/vuln/detail/CVE-2025-6075 https://github.com/python/cpython/issues/136065 https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6075.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python3&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sRVcQFAdq4Ll42smqacaCw==&#34;: {&#xA;      &#34;id&#34;: &#34;sRVcQFAdq4Ll42smqacaCw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2022-27943&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in binutils, where GNU GCC is vulnerable to a denial of service caused by a stack consumption in the demangle_const() function in libiberty/rust-demangle.c. The vulnerability exists due to the application not properly controlling the consumption of internal resources. By persuading a victim to open a specially-crafted file, an attacker could cause a denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-03-26T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2022-27943 https://bugzilla.redhat.com/show_bug.cgi?id=2071728 https://www.cve.org/CVERecord?id=CVE-2022-27943 https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-27943.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gcc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;sThg2GGoKqa1RTJ5skEJTA==&#34;: {&#xA;      &#34;id&#34;: &#34;sThg2GGoKqa1RTJ5skEJTA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-24883&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. A remote attacker could provide a specially crafted long signature packet that, when processed, causes the application to crash. This vulnerability leads to a denial of service (DoS), making the GnuPG application unavailable to legitimate users.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T18:43:18Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-24883 https://bugzilla.redhat.com/show_bug.cgi?id=2433463 https://www.cve.org/CVERecord?id=CVE-2026-24883 https://nvd.nist.gov/vuln/detail/CVE-2026-24883 https://dev.gnupg.org/T8049 https://www.openwall.com/lists/oss-security/2026/01/27/8 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-24883.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;t3XJyztcU9aOXTMLI8NRmA==&#34;: {&#xA;      &#34;id&#34;: &#34;t3XJyztcU9aOXTMLI8NRmA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-29111&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-23T21:03:56Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-29111 https://bugzilla.redhat.com/show_bug.cgi?id=2450505 https://www.cve.org/CVERecord?id=CVE-2026-29111 https://nvd.nist.gov/vuln/detail/CVE-2026-29111 https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6 https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412 https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69 https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6 https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8 https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-29111.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;systemd&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;t4oe6DBPNf5Ikk93RfTdig==&#34;: {&#xA;      &#34;id&#34;: &#34;t4oe6DBPNf5Ikk93RfTdig==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-12904&#34;,&#xA;      &#34;description&#34;: &#34;[Disputed] A vulnerability has been identified in Libgcrypt due to a flaw in its C implementation of AES. This vulnerability enables a remote attacker to perform a flush-and-reload side-channel attack, potentially accessing sensitive information. The vulnerability arises from the availability of physical addresses to other processes, particularly on platforms lacking an assembly-language implementation.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-07-16T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-12904 https://bugzilla.redhat.com/show_bug.cgi?id=1730320 https://www.cve.org/CVERecord?id=CVE-2019-12904 https://nvd.nist.gov/vuln/detail/CVE-2019-12904 https://dev.gnupg.org/T4541 https://lists.gnupg.org/pipermail/gcrypt-devel/2019-July/004760.html https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12904.html https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-12904.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libgcrypt&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tYeLT/YUKIk7yaK07WvPeA==&#34;: {&#xA;      &#34;id&#34;: &#34;tYeLT/YUKIk7yaK07WvPeA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-32776&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libexpat. A remote attacker could exploit this vulnerability by providing specially crafted XML content with empty external parameter entities. This could lead to a NULL pointer dereference, causing the application to crash and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-16T06:54:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-32776 https://bugzilla.redhat.com/show_bug.cgi?id=2447888 https://www.cve.org/CVERecord?id=CVE-2026-32776 https://nvd.nist.gov/vuln/detail/CVE-2026-32776 https://github.com/libexpat/libexpat/pull/1158 https://github.com/libexpat/libexpat/pull/1159 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-32776.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;teoauN/Djw6odXikmjP4Lw==&#34;: {&#xA;      &#34;id&#34;: &#34;teoauN/Djw6odXikmjP4Lw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-68471&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Avahi, a system that enables devices to discover services on a local network using the mDNS/DNS-SD (Multicast Domain Name System/DNS-based Service Discovery) protocols. A remote attacker can exploit this by sending two specific network messages, known as unsolicited announcements with CNAME resource records, within a two-second timeframe. This action can cause the `avahi-daemon` process to crash, leading to a Denial of Service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-12T17:39:57Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-68471 https://bugzilla.redhat.com/show_bug.cgi?id=2428717 https://www.cve.org/CVERecord?id=CVE-2025-68471 https://nvd.nist.gov/vuln/detail/CVE-2025-68471 https://github.com/avahi/avahi/commit/9c6eb53bf2e290aed84b1f207e3ce35c54cc0aa1 https://github.com/avahi/avahi/issues/678 https://github.com/avahi/avahi/security/advisories/GHSA-56rf-42xr-qmmg https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-68471.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;avahi&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tlWVK61iOpKPkvmeShS9AQ==&#34;: {&#xA;      &#34;id&#34;: &#34;tlWVK61iOpKPkvmeShS9AQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-69421&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-27T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-69421 https://bugzilla.redhat.com/show_bug.cgi?id=2430387 https://www.cve.org/CVERecord?id=CVE-2025-69421 https://nvd.nist.gov/vuln/detail/CVE-2025-69421 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-69421.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;openssl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;tnBbKyfWYMq7GMqd8UCfIw==&#34;: {&#xA;      &#34;id&#34;: &#34;tnBbKyfWYMq7GMqd8UCfIw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-70873&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in SQLite. This information disclosure vulnerability exists within the zipfile extension, specifically in the zipfileInflate function. A remote attacker could exploit this by providing a specially crafted ZIP file. Successful exploitation could lead to the disclosure of sensitive heap memory information.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-12T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-70873 https://bugzilla.redhat.com/show_bug.cgi?id=2447086 https://www.cve.org/CVERecord?id=CVE-2025-70873 https://nvd.nist.gov/vuln/detail/CVE-2025-70873 https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054 https://sqlite.org/forum/forumpost/761eac3c82 https://sqlite.org/src/info/3d459f1fb1bd1b5e https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-70873.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;u7b5r2PfK9a1QyjBR1cFRw==&#34;: {&#xA;      &#34;id&#34;: &#34;u7b5r2PfK9a1QyjBR1cFRw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4046&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in glibc, the GNU C Library. A remote attacker could exploit this vulnerability by providing specially crafted inputs using the IBM1390 or IBM1399 character sets to the `iconv()` function. This could lead to an assertion failure, causing the application to crash and resulting in a Denial of Service (DoS).&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T17:16:11Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4046 https://bugzilla.redhat.com/show_bug.cgi?id=2453117 https://www.cve.org/CVERecord?id=CVE-2026-4046 https://nvd.nist.gov/vuln/detail/CVE-2026-4046 https://packages.fedoraproject.org/pkgs/glibc/glibc-gconv-extra/ https://sourceware.org/bugzilla/show_bug.cgi?id=33980 https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4046.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glibc&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uEggs7thHCRp4eZu5EDH0A==&#34;: {&#xA;      &#34;id&#34;: &#34;uEggs7thHCRp4eZu5EDH0A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-27171&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in zlib. An attacker providing specially crafted input to the `crc32_combine64` or `crc32_combine_gen64` functions could trigger an infinite loop within the `x2nmodp` function. This leads to excessive CPU consumption, which can result in a Denial of Service (DoS) for the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-02-18T02:36:19Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-27171 https://bugzilla.redhat.com/show_bug.cgi?id=2440530 https://www.cve.org/CVERecord?id=CVE-2026-27171 https://nvd.nist.gov/vuln/detail/CVE-2026-27171 https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/ https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf https://github.com/madler/zlib/issues/904 https://github.com/madler/zlib/releases/tag/v1.3.2 https://ostif.org/zlib-audit-complete/ https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-27171.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;zlib&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uWVbYb9OwW4BBqLbnE2d4A==&#34;: {&#xA;      &#34;id&#34;: &#34;uWVbYb9OwW4BBqLbnE2d4A==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-23865&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in Freetype. An integer overflow vulnerability exists when processing specially crafted OpenType variable fonts. A local attacker could exploit this by convincing a user to open a malicious font file, which may lead to an out-of-bounds read and potential information disclosure or denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-02T16:09:42Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-23865 https://bugzilla.redhat.com/show_bug.cgi?id=2443891 https://www.cve.org/CVERecord?id=CVE-2026-23865 https://nvd.nist.gov/vuln/detail/CVE-2026-23865 https://gitlab.com/freetype/freetype/-/commit/fc85a255849229c024c8e65f536fe1875d84841c https://sourceforge.net/projects/freetype/files/freetype2/2.14.2/ https://www.facebook.com/security/advisories/cve-2026-23865 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-23865.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;java-17-openjdk&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;uxd8tIEkk+r2hWTEgvyv8w==&#34;: {&#xA;      &#34;id&#34;: &#34;uxd8tIEkk+r2hWTEgvyv8w==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2019-9936&#34;,&#xA;      &#34;description&#34;: &#34;In SQLite 3.27.2, running fts5 prefix queries inside a transaction could trigger a heap-based buffer over-read in fts5HashEntrySort in sqlite3.c, which may lead to an information leak. This is related to ext/fts5/fts5_hash.c.&#34;,&#xA;      &#34;issued&#34;: &#34;2019-03-18T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2019-9936 https://bugzilla.redhat.com/show_bug.cgi?id=1692365 https://www.cve.org/CVERecord?id=CVE-2019-9936 https://nvd.nist.gov/vuln/detail/CVE-2019-9936 https://security.access.redhat.com/data/csaf/v2/vex/2019/cve-2019-9936.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;sqlite&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;v1exQXePimNPt3tveLBP9g==&#34;: {&#xA;      &#34;id&#34;: &#34;v1exQXePimNPt3tveLBP9g==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-1965&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When an application uses libcurl to make multiple Negotiate-authenticated HTTP or HTTPS requests to the same server with different credentials, libcurl may incorrectly reuse an existing connection. This logical error can cause a subsequent request to be sent using the authentication of a previous user, leading to an authentication bypass.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-11T10:08:52Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-1965 https://bugzilla.redhat.com/show_bug.cgi?id=2446448 https://www.cve.org/CVERecord?id=CVE-2026-1965 https://nvd.nist.gov/vuln/detail/CVE-2026-1965 https://curl.se/docs/CVE-2026-1965.html https://curl.se/docs/CVE-2026-1965.json https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-1965.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vTJZ/R8pdcyDbwAwRi8cBw==&#34;: {&#xA;      &#34;id&#34;: &#34;vTJZ/R8pdcyDbwAwRi8cBw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-15079&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When performing SSH-based transfers using SCP or SFTP, libcurl could mistakenly connect to hosts not listed in the user-specified knownhosts file. This occurs if the host is present in the libssh global knownhosts file, effectively bypassing the intended host verification. This could allow a remote attacker to connect to an untrusted host, potentially leading to information disclosure or man-in-the-middle attacks.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-07T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-15079 https://bugzilla.redhat.com/show_bug.cgi?id=2426409 https://www.cve.org/CVERecord?id=CVE-2025-15079 https://nvd.nist.gov/vuln/detail/CVE-2025-15079 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-15079.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;vx2N2RZTm7neux8kVlqgEg==&#34;: {&#xA;      &#34;id&#34;: &#34;vx2N2RZTm7neux8kVlqgEg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5704&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in tar. A remote attacker could exploit this vulnerability by crafting a malicious archive, leading to hidden file injection with fully attacker-controlled content. This bypasses pre-extraction inspection mechanisms, potentially allowing an attacker to introduce malicious files onto a system without detection.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-04-06T13:36:20Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5704 https://bugzilla.redhat.com/show_bug.cgi?id=2455360 https://www.cve.org/CVERecord?id=CVE-2026-5704 https://nvd.nist.gov/vuln/detail/CVE-2026-5704 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5704.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;tar&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wbBiCPikq6Iz02EPsysTgA==&#34;: {&#xA;      &#34;id&#34;: &#34;wbBiCPikq6Iz02EPsysTgA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-14017&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in curl. When performing multi-threaded LDAPS (Lightweight Directory Access Protocol Secure) transfers, changes to Transport Layer Security (TLS) options in one thread could inadvertently apply globally, affecting other concurrent transfers. This could lead to unintended security posture changes, such as disabling certificate verification for other threads. This vulnerability can result in a security bypass, where expected security checks are not performed.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-08T10:07:05Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-14017 https://bugzilla.redhat.com/show_bug.cgi?id=2427870 https://www.cve.org/CVERecord?id=CVE-2025-14017 https://nvd.nist.gov/vuln/detail/CVE-2025-14017 https://curl.se/docs/CVE-2025-14017.html https://curl.se/docs/CVE-2025-14017.json https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-14017.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;curl&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;wxS+u/uf8o4sT9iSccXQwA==&#34;: {&#xA;      &#34;id&#34;: &#34;wxS+u/uf8o4sT9iSccXQwA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-4426&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. An Undefined Behavior vulnerability exists in the zisofs decompression logic, caused by improper validation of a field (`pz_log2_bs`) read from ISO9660 Rock Ridge extensions. A remote attacker can exploit this by supplying a specially crafted ISO file. This can lead to incorrect memory allocation and potential application crashes, resulting in a denial-of-service (DoS) condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-4426 https://bugzilla.redhat.com/show_bug.cgi?id=2449010 https://www.cve.org/CVERecord?id=CVE-2026-4426 https://nvd.nist.gov/vuln/detail/CVE-2026-4426 https://github.com/libarchive/libarchive/pull/2897 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-4426.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xCUiEQAH1lfhrKtUxQDIYA==&#34;: {&#xA;      &#34;id&#34;: &#34;xCUiEQAH1lfhrKtUxQDIYA==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2021-39537&#34;,&#xA;      &#34;description&#34;: &#34;A heap overflow vulnerability has been identified in the ncurses package, particularly in the \&#34;tic\&#34;. This flaw results from a lack of proper bounds checking during input processing. By exploiting this boundary error, an attacker can create a malicious file, deceive the victim into opening it using the affected software, and initiate an out-of-bounds write, potentially impacting system availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2020-08-04T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2021-39537 https://bugzilla.redhat.com/show_bug.cgi?id=2006978 https://www.cve.org/CVERecord?id=CVE-2021-39537 https://nvd.nist.gov/vuln/detail/CVE-2021-39537 https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-39537.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;ncurses&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xKLQGv5zNwcnWtQQKiO3Ww==&#34;: {&#xA;      &#34;id&#34;: &#34;xKLQGv5zNwcnWtQQKiO3Ww==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-25645&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the `requests` HTTP library, specifically in the `requests.utils.extract_zipped_paths()` function, which is used to load Certificate Authority (CA) bundles. A local attacker can exploit this vulnerability by pre-creating a malicious CA bundle file in the system&#39;s temporary directory. When a vulnerable application initializes the `requests` library, it may load this malicious file instead of the legitimate CA bundle, leading to a bypass of security controls and potential integrity compromise.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-25T17:02:48Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-25645 https://bugzilla.redhat.com/show_bug.cgi?id=2451408 https://www.cve.org/CVERecord?id=CVE-2026-25645 https://nvd.nist.gov/vuln/detail/CVE-2026-25645 https://github.com/psf/requests/commit/66d21cb07bd6255b1280291c4fafb71803cdb3b7 https://github.com/psf/requests/releases/tag/v2.33.0 https://github.com/psf/requests/security/advisories/GHSA-gc5v-m9x4-r6x2 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-25645.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;python-pip&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xLIujTim86EomaRofe4tDg==&#34;: {&#xA;      &#34;id&#34;: &#34;xLIujTim86EomaRofe4tDg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2023-32611&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2022-12-14T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2023-32611 https://bugzilla.redhat.com/show_bug.cgi?id=2211829 https://www.cve.org/CVERecord?id=CVE-2023-32611 https://nvd.nist.gov/vuln/detail/CVE-2023-32611 https://gitlab.gnome.org/GNOME/glib/-/issues/2797 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32611.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;glib2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xYjfT47p5BaLoMKfWyn2HQ==&#34;: {&#xA;      &#34;id&#34;: &#34;xYjfT47p5BaLoMKfWyn2HQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-24515&#34;,&#xA;      &#34;description&#34;: &#34;In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-23T07:46:36Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-24515 https://bugzilla.redhat.com/show_bug.cgi?id=2432312 https://www.cve.org/CVERecord?id=CVE-2026-24515 https://nvd.nist.gov/vuln/detail/CVE-2026-24515 https://github.com/libexpat/libexpat/pull/1131 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-24515.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;expat&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;xjRJnKlNaH/FGi0NN5VKBQ==&#34;: {&#xA;      &#34;id&#34;: &#34;xjRJnKlNaH/FGi0NN5VKBQ==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-0992&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated \u003cnextCatalog\u003e elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-01-15T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-0992 https://bugzilla.redhat.com/show_bug.cgi?id=2429975 https://www.cve.org/CVERecord?id=CVE-2026-0992 https://nvd.nist.gov/vuln/detail/CVE-2026-0992 https://gitlab.gnome.org/GNOME/libxml2/-/issues/1019 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-0992.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yGCmffaimhyTCMJRNZflXg==&#34;: {&#xA;      &#34;id&#34;: &#34;yGCmffaimhyTCMJRNZflXg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2026-5121&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.&#34;,&#xA;      &#34;issued&#34;: &#34;2026-03-30T07:44:15Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2026-5121 https://bugzilla.redhat.com/show_bug.cgi?id=2452945 https://www.cve.org/CVERecord?id=CVE-2026-5121 https://nvd.nist.gov/vuln/detail/CVE-2026-5121 https://github.com/advisories/GHSA-2vwv-vqpv-v8vc https://github.com/libarchive/libarchive/pull/2934 https://security.access.redhat.com/data/csaf/v2/vex/2026/cve-2026-5121.json https://access.redhat.com/errata/RHSA-2026:8534&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libarchive&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;binary&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;aarch64|i686|ppc64le|s390x|src|amd64|x86_64&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:baseos:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:baseos:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;0:3.3.3-7.el8_10&#34;,&#xA;      &#34;arch_op&#34;: &#34;pattern match&#34;&#xA;    },&#xA;    &#34;yePhQ2wYSrZV2+z+gEbpRg==&#34;: {&#xA;      &#34;id&#34;: &#34;yePhQ2wYSrZV2+z+gEbpRg==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-9714&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libxstl/libxml2. The &#39;exsltDynMapFunction&#39; function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling &#39;dyn:map()&#39;, leading to stack exhaustion and a local denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-02T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Medium&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libxml2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;yuFlxOGqQlDuMCywIIELNw==&#34;: {&#xA;      &#34;id&#34;: &#34;yuFlxOGqQlDuMCywIIELNw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-30258&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in GnuPG. In affected versions, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, leading to a verification denial of service.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-03-19T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-30258 https://bugzilla.redhat.com/show_bug.cgi?id=2353427 https://www.cve.org/CVERecord?id=CVE-2025-30258 https://nvd.nist.gov/vuln/detail/CVE-2025-30258 https://dev.gnupg.org/T7527 https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-30258.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;gnupg2&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    },&#xA;    &#34;zMNYUY09QO2aCVD23XG4dw==&#34;: {&#xA;      &#34;id&#34;: &#34;zMNYUY09QO2aCVD23XG4dw==&#34;,&#xA;      &#34;updater&#34;: &#34;rhel-vex&#34;,&#xA;      &#34;name&#34;: &#34;CVE-2025-8277&#34;,&#xA;      &#34;description&#34;: &#34;A flaw was found in libssh&#39;s handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.&#34;,&#xA;      &#34;issued&#34;: &#34;2025-09-09T00:00:00Z&#34;,&#xA;      &#34;links&#34;: &#34;https://access.redhat.com/security/cve/CVE-2025-8277 https://bugzilla.redhat.com/show_bug.cgi?id=2383888 https://www.cve.org/CVERecord?id=CVE-2025-8277 https://nvd.nist.gov/vuln/detail/CVE-2025-8277 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8277.json&#34;,&#xA;      &#34;severity&#34;: &#34;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L&#34;,&#xA;      &#34;normalized_severity&#34;: &#34;Low&#34;,&#xA;      &#34;package&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;libssh&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;kind&#34;: &#34;source&#34;,&#xA;        &#34;normalized_version&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;distribution&#34;: {&#xA;        &#34;id&#34;: &#34;&#34;,&#xA;        &#34;did&#34;: &#34;&#34;,&#xA;        &#34;name&#34;: &#34;&#34;,&#xA;        &#34;version&#34;: &#34;&#34;,&#xA;        &#34;version_code_name&#34;: &#34;&#34;,&#xA;        &#34;version_id&#34;: &#34;&#34;,&#xA;        &#34;arch&#34;: &#34;&#34;,&#xA;        &#34;cpe&#34;: &#34;&#34;,&#xA;        &#34;pretty_name&#34;: &#34;&#34;&#xA;      },&#xA;      &#34;repository&#34;: {&#xA;        &#34;name&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;,&#xA;        &#34;key&#34;: &#34;rhel-cpe-repository&#34;,&#xA;        &#34;cpe&#34;: &#34;cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*&#34;&#xA;      },&#xA;      &#34;fixed_in_version&#34;: &#34;&#34;&#xA;    }&#xA;  },&#xA;  &#34;package_vulnerabilities&#34;: {&#xA;    &#34;+hvIC0Et/RtHi7EAFCmfEw==&#34;: [&#xA;      &#34;O6eQrDqYe8zCvECWFMIzFQ==&#34;,&#xA;      &#34;MRnBR1NwPejsF0F/Po53Ew==&#34;&#xA;    ],&#xA;    &#34;+qrxjVH7Im8eBfrz4h4P/w==&#34;: [&#xA;      &#34;Zp9+pixFuNBueE2yO610gQ==&#34;&#xA;    ],&#xA;    &#34;/ji9IJ9FfNcwqVRbMWZshQ==&#34;: [&#xA;      &#34;+nHq7dak7Hkjcru/xpwzhQ==&#34;,&#xA;      &#34;L7QbkTbsy8v3tMfOqNsVKQ==&#34;&#xA;    ],&#xA;    &#34;0+9x6aIRcNDCM7R94cpzew==&#34;: [&#xA;      &#34;8TgjbHNGzIFm7/fF9DBU7Q==&#34;,&#xA;      &#34;1vG4ZYIu07BTj9XJ+a+P9Q==&#34;,&#xA;      &#34;B5eXEM8SeidgdpzXoFJFGQ==&#34;,&#xA;      &#34;m8ueKfgkaYIYTU+xtIQcwA==&#34;,&#xA;      &#34;Te9j1HGn7feNCE/Fduu0+A==&#34;,&#xA;      &#34;YoCxZvEp16Bt9LDv+Ficeg==&#34;,&#xA;      &#34;I31WPu2ZGWOsqloSJfE2Fg==&#34;,&#xA;      &#34;uWVbYb9OwW4BBqLbnE2d4A==&#34;,&#xA;      &#34;cW+DgNrGAeRAwNB4wrDZhw==&#34;,&#xA;      &#34;VPoF+qCqaQ4y2sVl2255/g==&#34;,&#xA;      &#34;s1kzjy+cDztHEcgHrl7kHQ==&#34;,&#xA;      &#34;OTZM0RD60ajdSeEqWGkkTw==&#34;,&#xA;      &#34;29qrZyz+fmdn9Nzjpl2/Pg==&#34;,&#xA;      &#34;6p6EeZQEuYkK2CtO4ey3Ag==&#34;,&#xA;      &#34;FkRDB0vpJYeh2ipqLS0/Iw==&#34;&#xA;    ],&#xA;    &#34;2PBlaOceApWEi634ZUHO/g==&#34;: [&#xA;      &#34;mRazAXjBcgFrTolNDZHDsA==&#34;,&#xA;      &#34;h6rS2s3xilGaG0a+pIjl8A==&#34;,&#xA;      &#34;mVT54HSCxoOy6IF9Noa/Zw==&#34;,&#xA;      &#34;sGwL9v57mGx7f18qBkIacA==&#34;,&#xA;      &#34;6Xr5PbPGSy+aHLDQ9q4L9w==&#34;,&#xA;      &#34;RVCidRUm4D1IKoPhoUi2AA==&#34;,&#xA;      &#34;L3k0cIIlkMGQFiWnZm8Mlg==&#34;,&#xA;      &#34;XXiaw1EwhFkuilI94EKiqQ==&#34;,&#xA;      &#34;X37PWFfcTFBuBxL2613UQg==&#34;,&#xA;      &#34;0QzoXQSqkKieJ7Oc+px0JA==&#34;,&#xA;      &#34;8qOJVWAut1+UqTXPOWH12g==&#34;,&#xA;      &#34;HB9r/GLycEmk6aXttwtBlw==&#34;,&#xA;      &#34;2U8ppg+02PjFDuM5YqFstQ==&#34;,&#xA;      &#34;HKrLnQyTw1292mNt3MQ0aQ==&#34;,&#xA;      &#34;ZlxfTVb/4bi6yWQ+JLaOnw==&#34;,&#xA;      &#34;nYtstWEUOCTbjAlmYOKURA==&#34;,&#xA;      &#34;5ZHvcDYhgzWjwNpRgF2u1w==&#34;,&#xA;      &#34;IItHEdPWz5fl9O7ZhzjDAA==&#34;,&#xA;      &#34;OFdQC3/0S5rItoyqpACTFw==&#34;,&#xA;      &#34;8rvqTFlh9aOz4UvxQN0SBQ==&#34;,&#xA;      &#34;cCowLuOsLfTMmPFOoqUVww==&#34;&#xA;    ],&#xA;    &#34;4flTdmUV4iK1Ax+LXJm8qQ==&#34;: [&#xA;      &#34;fvGjL9hw9hDQockMTb7lrA==&#34;&#xA;    ],&#xA;    &#34;4uQuJg+li+gGAwnGRDcs+w==&#34;: [&#xA;      &#34;+nHq7dak7Hkjcru/xpwzhQ==&#34;,&#xA;      &#34;L7QbkTbsy8v3tMfOqNsVKQ==&#34;&#xA;    ],&#xA;    &#34;7eg89eCgA75bJ7WhhN/T4Q==&#34;: [&#xA;      &#34;eqoqeJN8gMUINJLH2PXP7g==&#34;,&#xA;      &#34;hkP7fdNBNcMv5alTtw0c+Q==&#34;&#xA;    ],&#xA;    &#34;9uhqFNTCJ7/bpzSlc7qCaQ==&#34;: [&#xA;      &#34;t4oe6DBPNf5Ikk93RfTdig==&#34;,&#xA;      &#34;fXpWtuXNPi3tb2edhk37bw==&#34;&#xA;    ],&#xA;    &#34;AIs6pmCup5N9+6Ag6e2/og==&#34;: [&#xA;      &#34;qv1CBAIhzNsoWe8hSWlF1g==&#34;,&#xA;      &#34;UPzTyNn8ZLXlb+bwRFPPTA==&#34;,&#xA;      &#34;WcChSpNAL6V9Xfxc9AqW7g==&#34;,&#xA;      &#34;ZkEez7f24VNVhTaTCDhuEg==&#34;,&#xA;      &#34;6FQUI3OxX4C5skWXKgq80Q==&#34;,&#xA;      &#34;OpUahpCA4oBceG962KxTMA==&#34;,&#xA;      &#34;QcOTYeOedG0AUhPSakMpIA==&#34;,&#xA;      &#34;rEd6JdG2xx5NZ9bcsFRNpw==&#34;,&#xA;      &#34;PcNbuWOo0ahqjfbOQhXvvQ==&#34;,&#xA;      &#34;gagftKXuSuh9pi4dRu9yPQ==&#34;,&#xA;      &#34;8D3i4K1ylUr5dGk9imV9zA==&#34;,&#xA;      &#34;97PwDrD8knMveLXwKCvQjA==&#34;,&#xA;      &#34;tlWVK61iOpKPkvmeShS9AQ==&#34;,&#xA;      &#34;86unVXyTxdffdcXWZTYw5g==&#34;,&#xA;      &#34;BV++s35Ur4bQRS6HK0QCIA==&#34;,&#xA;      &#34;OLKvdPVgT9/lPcflJTxE3Q==&#34;,&#xA;      &#34;UgHucRu0hN47CoyxGAMXTQ==&#34;,&#xA;      &#34;rCI1GSL47zJlliQotxXM4Q==&#34;,&#xA;      &#34;Fp999hDC/lucBsNHwOlp/A==&#34;,&#xA;      &#34;VLzwKVDYC7fQrtcpCzjXjA==&#34;,&#xA;      &#34;QUtTYJuHdkAOgtveagWUfA==&#34;,&#xA;      &#34;LWLSX4FCLbzYWK97i5Or+A==&#34;,&#xA;      &#34;rVgBV65FWtFg3jitEqotFA==&#34;&#xA;    ],&#xA;    &#34;AuC6XQzcU/5tB4luIfjLFg==&#34;: [&#xA;      &#34;HTk+AAyRWNCrZTtBLx34Aw==&#34;&#xA;    ],&#xA;    &#34;AziZ1oGI+oDXVPzldKNj+w==&#34;: [&#xA;      &#34;3O4IzHXnRQMZXCe1gYATvw==&#34;&#xA;    ],&#xA;    &#34;BPsD0kkdIoK3KQUZ5DpJjw==&#34;: [&#xA;      &#34;ZvX4VR3jvMBd1Wq+RxNTgg==&#34;&#xA;    ],&#xA;    &#34;DV119Dw0W4RdsbJkdoHU9w==&#34;: [&#xA;      &#34;qXNASosSuCsudML1MqXPjw==&#34;,&#xA;      &#34;rfyVleP0iFAaKAccoWyLNQ==&#34;,&#xA;      &#34;8KJb4x3mXgChaQULEsid2A==&#34;,&#xA;      &#34;Znm2hdK/FULQhTTGTVX59Q==&#34;,&#xA;      &#34;v1exQXePimNPt3tveLBP9g==&#34;,&#xA;      &#34;pjb5LKdJAfqIzj4N6YBwUQ==&#34;,&#xA;      &#34;crmilTSJ/pTSPBKY9EJmZg==&#34;,&#xA;      &#34;fayrPya6DVXP9weWvA6obQ==&#34;,&#xA;      &#34;TuBnhFrkwMqIcYtYYgNGNQ==&#34;,&#xA;      &#34;ho4M6//kfDyE5kZ9fbpV0g==&#34;,&#xA;      &#34;wbBiCPikq6Iz02EPsysTgA==&#34;,&#xA;      &#34;vTJZ/R8pdcyDbwAwRi8cBw==&#34;,&#xA;      &#34;Pe4IHqZpuBtuSkrgd2HMEg==&#34;&#xA;    ],&#xA;    &#34;DgyhtZBcSIlVmY6xC8s1mA==&#34;: [&#xA;      &#34;j1KIfSLRyAo+5FqbDzJbtg==&#34;&#xA;    ],&#xA;    &#34;EGfzPeF6a5hj9x4BwoN25A==&#34;: [&#xA;      &#34;SixpK4TZp5ARiPVlZlGpew==&#34;&#xA;    ],&#xA;    &#34;FS5/DAbDsXWURU9onlACPA==&#34;: [&#xA;      &#34;Q5xJp4zJ1MCYcYbDi9qrdQ==&#34;&#xA;    ],&#xA;    &#34;J34PJ2GThOWZuKVgFIoieA==&#34;: [&#xA;      &#34;uEggs7thHCRp4eZu5EDH0A==&#34;&#xA;    ],&#xA;    &#34;LXiVkIlXLq/usMYIwCTH8Q==&#34;: [&#xA;      &#34;WGvgNwrW2u5APZcidQ6v1Q==&#34;&#xA;    ],&#xA;    &#34;LkoLKEri5dIAb0vFMkSOag==&#34;: [&#xA;      &#34;6Cqvzp5JbuVfHsuYnIJNFw==&#34;,&#xA;      &#34;u7b5r2PfK9a1QyjBR1cFRw==&#34;,&#xA;      &#34;cqYWiTibDLM7aibErMKang==&#34;&#xA;    ],&#xA;    &#34;N1RbIRo2SyHosQefv+skDw==&#34;: [&#xA;      &#34;UbmdE2pHXRFccv8l1e02Jw==&#34;&#xA;    ],&#xA;    &#34;N3ZaMrNJKoumMpaY0smlMQ==&#34;: [&#xA;      &#34;8ZxbhBIT+9Mj99/XbMpLSQ==&#34;,&#xA;      &#34;9zRC9UwUH2bQs1UcHQ5UTQ==&#34;,&#xA;      &#34;uxd8tIEkk+r2hWTEgvyv8w==&#34;,&#xA;      &#34;5B1tQ2BK8z/YjRkYcvwqag==&#34;,&#xA;      &#34;tnBbKyfWYMq7GMqd8UCfIw==&#34;&#xA;    ],&#xA;    &#34;NguWV8S6YQYvQsGQDJm2Rg==&#34;: [&#xA;      &#34;xCUiEQAH1lfhrKtUxQDIYA==&#34;,&#xA;      &#34;HuOxI+pWjgGV0XsBvltzlg==&#34;,&#xA;      &#34;SHxE0qXbBmDEp/LL1ieJeA==&#34;,&#xA;      &#34;rEg00U8+//igCt+0+QBUhA==&#34;,&#xA;      &#34;jw1ZiDut5Ot+DyVFjCrixg==&#34;,&#xA;      &#34;673FKazcUiydbfN5c6amaw==&#34;,&#xA;      &#34;ZTGiJlkqcqrCLJSY/Sq8lA==&#34;,&#xA;      &#34;VsocCwaFpF6PzdX5PxR+sQ==&#34;,&#xA;      &#34;S7qx7a03HASsJhyQafvXjg==&#34;&#xA;    ],&#xA;    &#34;ORsDK2A5479NPB0r01PoXQ==&#34;: [&#xA;      &#34;qXNASosSuCsudML1MqXPjw==&#34;,&#xA;      &#34;rfyVleP0iFAaKAccoWyLNQ==&#34;,&#xA;      &#34;8KJb4x3mXgChaQULEsid2A==&#34;,&#xA;      &#34;Znm2hdK/FULQhTTGTVX59Q==&#34;,&#xA;      &#34;v1exQXePimNPt3tveLBP9g==&#34;,&#xA;      &#34;pjb5LKdJAfqIzj4N6YBwUQ==&#34;,&#xA;      &#34;crmilTSJ/pTSPBKY9EJmZg==&#34;,&#xA;      &#34;fayrPya6DVXP9weWvA6obQ==&#34;,&#xA;      &#34;TuBnhFrkwMqIcYtYYgNGNQ==&#34;,&#xA;      &#34;ho4M6//kfDyE5kZ9fbpV0g==&#34;,&#xA;      &#34;wbBiCPikq6Iz02EPsysTgA==&#34;,&#xA;      &#34;vTJZ/R8pdcyDbwAwRi8cBw==&#34;,&#xA;      &#34;Pe4IHqZpuBtuSkrgd2HMEg==&#34;&#xA;    ],&#xA;    &#34;POPH5BJ/Q4Bfen05TT291g==&#34;: [&#xA;      &#34;+nHq7dak7Hkjcru/xpwzhQ==&#34;,&#xA;      &#34;L7QbkTbsy8v3tMfOqNsVKQ==&#34;&#xA;    ],&#xA;    &#34;Q0uPb/t/3IQ8GEwlv/J3Cw==&#34;: [&#xA;      &#34;WGvgNwrW2u5APZcidQ6v1Q==&#34;&#xA;    ],&#xA;    &#34;QC6e3OaV78mjs678tGU2KQ==&#34;: [&#xA;      &#34;eohUFw28jV3sGLZE2CBPXA==&#34;,&#xA;      &#34;H9Ud41wofJc/QlL6Rm7WkA==&#34;,&#xA;      &#34;avzu5SRbIjcduH4QdmZ1gg==&#34;,&#xA;      &#34;OgFGrvrnAoXXvapnatTrxQ==&#34;,&#xA;      &#34;XbpXfbeApuDuIKvY0/qWiA==&#34;,&#xA;      &#34;ruDQdx7OmIsgMCpioWbqOQ==&#34;,&#xA;      &#34;zMNYUY09QO2aCVD23XG4dw==&#34;,&#xA;      &#34;npQpPXYG8xMJ1LRSVSnKGA==&#34;,&#xA;      &#34;KCgCqCavM9U0xL+GHJqzSg==&#34;,&#xA;      &#34;Rfm1tD+QxSP/TVjKFDNabg==&#34;&#xA;    ],&#xA;    &#34;U3ZkYu9FoEzQITrVBlQtLA==&#34;: [&#xA;      &#34;6Cqvzp5JbuVfHsuYnIJNFw==&#34;,&#xA;      &#34;u7b5r2PfK9a1QyjBR1cFRw==&#34;,&#xA;      &#34;cqYWiTibDLM7aibErMKang==&#34;&#xA;    ],&#xA;    &#34;UUZyda9G/ffvF6rJ5W1UnQ==&#34;: [&#xA;      &#34;sRVcQFAdq4Ll42smqacaCw==&#34;,&#xA;      &#34;mouoWVvs12H8FynnB5qIsQ==&#34;,&#xA;      &#34;ieASPdYzGxWke8nZZhE02Q==&#34;&#xA;    ],&#xA;    &#34;Vax934M9zGbzjdT3Y/XU9w==&#34;: [&#xA;      &#34;6Cqvzp5JbuVfHsuYnIJNFw==&#34;,&#xA;      &#34;u7b5r2PfK9a1QyjBR1cFRw==&#34;,&#xA;      &#34;cqYWiTibDLM7aibErMKang==&#34;&#xA;    ],&#xA;    &#34;Wq1n4jzKBPdL9z5l5HD99w==&#34;: [&#xA;      &#34;DDWmqlxBSfXi2KJJ5mwTNg==&#34;,&#xA;      &#34;8Sec+JvKiQWGqYCOBdZhjg==&#34;,&#xA;      &#34;wxS+u/uf8o4sT9iSccXQwA==&#34;,&#xA;      &#34;AE8Cp1u8I9t52OYW7oGU4w==&#34;,&#xA;      &#34;HNpGGr9eP5twQKC3yCh1mA==&#34;,&#xA;      &#34;O8fIVXqcGshIonMWsEH9gA==&#34;,&#xA;      &#34;EQ4eP3gKo3y8JsWUiWr6+g==&#34;,&#xA;      &#34;XygysGe2kdlyCRQHM1fu3w==&#34;,&#xA;      &#34;OPNDKUsVLJt2v1gO1zvkBA==&#34;,&#xA;      &#34;YiJlkUTKf0/7+ORZMmQ2cw==&#34;,&#xA;      &#34;4/mftydHpy90Umw3G0mTuQ==&#34;,&#xA;      &#34;klCkJxhhNVG564GOUQMh+Q==&#34;,&#xA;      &#34;/QaL/BUIdoF2MAB/C1YiGQ==&#34;,&#xA;      &#34;yGCmffaimhyTCMJRNZflXg==&#34;&#xA;    ],&#xA;    &#34;YjDcGmvP0/z8VqRiUvkhOQ==&#34;: [&#xA;      &#34;yuFlxOGqQlDuMCywIIELNw==&#34;,&#xA;      &#34;sThg2GGoKqa1RTJ5skEJTA==&#34;,&#xA;      &#34;W/d4trZ7jb2yxjrq4cNOWA==&#34;,&#xA;      &#34;0nQ3GJDLY22M176Z5ESg6A==&#34;&#xA;    ],&#xA;    &#34;auI8KtI6OozP7EAIr9UlQQ==&#34;: [&#xA;      &#34;icj6a8bc4dYK/DJNvkU0+A==&#34;&#xA;    ],&#xA;    &#34;bWUdPEYmtshwdmuX5VapfQ==&#34;: [&#xA;      &#34;WGvgNwrW2u5APZcidQ6v1Q==&#34;&#xA;    ],&#xA;    &#34;f/Al/eNlUhjEgKSV0J2z7w==&#34;: [&#xA;      &#34;QSNBg/XspHcBwSxBTMU4rg==&#34;,&#xA;      &#34;xKLQGv5zNwcnWtQQKiO3Ww==&#34;,&#xA;      &#34;gaFOKxy9D9KR/Iyd+kDZoA==&#34;,&#xA;      &#34;HuLJLN6ajygY/CpLyzV5lw==&#34;,&#xA;      &#34;8I2jFG8JRR+6+eqqYlXhAg==&#34;&#xA;    ],&#xA;    &#34;h53SWWmMQUh4cLyBmYeNvw==&#34;: [&#xA;      &#34;Bgew407C4GMDdNe8dNeN7w==&#34;,&#xA;      &#34;9jHXNtwzqlOir/Op7pd9+w==&#34;,&#xA;      &#34;Rw8DyDlyRHRJOeZaAbGMRA==&#34;,&#xA;      &#34;A1UDSDMkPKOSx7ma/geQyg==&#34;,&#xA;      &#34;MW3KGjkk7BWuR5JCc6cywg==&#34;,&#xA;      &#34;kYYDrncBncmKkmFnSd5t3w==&#34;,&#xA;      &#34;teoauN/Djw6odXikmjP4Lw==&#34;,&#xA;      &#34;7lnphmrb/VojuhlikpNO5w==&#34;,&#xA;      &#34;sExC9WXn4M01POjg0haQrA==&#34;&#xA;    ],&#xA;    &#34;hSTTMcRX1DBcXc+8jKeg3Q==&#34;: [&#xA;      &#34;sRVcQFAdq4Ll42smqacaCw==&#34;,&#xA;      &#34;mouoWVvs12H8FynnB5qIsQ==&#34;,&#xA;      &#34;ieASPdYzGxWke8nZZhE02Q==&#34;&#xA;    ],&#xA;    &#34;isPl2YxnCTfcLmUYH6Q0sA==&#34;: [&#xA;      &#34;WGvgNwrW2u5APZcidQ6v1Q==&#34;&#xA;    ],&#xA;    &#34;j5YRt82iOHry4ndSyCLgaA==&#34;: [&#xA;      &#34;/1CYFiexnJcM7p4YrI/FVg==&#34;,&#xA;      &#34;eCNdMtt9JN2Rrb8I23NIsA==&#34;,&#xA;      &#34;RdjNn4dAdZKcn6VS95a/SQ==&#34;,&#xA;      &#34;K3eafQ/8P8PEZ3BPWZfCgg==&#34;,&#xA;      &#34;UyCjBcpeB0nhkRTVhUcAJQ==&#34;,&#xA;      &#34;kCsMurCi7F77HxJoLqd9jA==&#34;,&#xA;      &#34;0WTD6ZUY2Zj2w0R3oyPWRw==&#34;,&#xA;      &#34;9oBjtBiHtz7+Hwc4swPaAw==&#34;,&#xA;      &#34;3IgZDz5UYkhu/U1/4kSWKg==&#34;&#xA;    ],&#xA;    &#34;jSeaYCeiTMhbTniYmwK8dQ==&#34;: [&#xA;      &#34;mRazAXjBcgFrTolNDZHDsA==&#34;,&#xA;      &#34;h6rS2s3xilGaG0a+pIjl8A==&#34;,&#xA;      &#34;mVT54HSCxoOy6IF9Noa/Zw==&#34;,&#xA;      &#34;sGwL9v57mGx7f18qBkIacA==&#34;,&#xA;      &#34;6Xr5PbPGSy+aHLDQ9q4L9w==&#34;,&#xA;      &#34;RVCidRUm4D1IKoPhoUi2AA==&#34;,&#xA;      &#34;L3k0cIIlkMGQFiWnZm8Mlg==&#34;,&#xA;      &#34;XXiaw1EwhFkuilI94EKiqQ==&#34;,&#xA;      &#34;X37PWFfcTFBuBxL2613UQg==&#34;,&#xA;      &#34;0QzoXQSqkKieJ7Oc+px0JA==&#34;,&#xA;      &#34;8qOJVWAut1+UqTXPOWH12g==&#34;,&#xA;      &#34;HB9r/GLycEmk6aXttwtBlw==&#34;,&#xA;      &#34;2U8ppg+02PjFDuM5YqFstQ==&#34;,&#xA;      &#34;HKrLnQyTw1292mNt3MQ0aQ==&#34;,&#xA;      &#34;ZlxfTVb/4bi6yWQ+JLaOnw==&#34;,&#xA;      &#34;nYtstWEUOCTbjAlmYOKURA==&#34;,&#xA;      &#34;5ZHvcDYhgzWjwNpRgF2u1w==&#34;,&#xA;      &#34;IItHEdPWz5fl9O7ZhzjDAA==&#34;,&#xA;      &#34;OFdQC3/0S5rItoyqpACTFw==&#34;,&#xA;      &#34;8rvqTFlh9aOz4UvxQN0SBQ==&#34;,&#xA;      &#34;cCowLuOsLfTMmPFOoqUVww==&#34;&#xA;    ],&#xA;    &#34;k/BpvWmZ5EVfmiPqpZ3pGw==&#34;: [&#xA;      &#34;qC/lM94bJkHuTCcx6Z47mQ==&#34;,&#xA;      &#34;KExChYIaW0MvXNLWbjS/Hw==&#34;,&#xA;      &#34;RYqFgDYIttLgJc8B82sK/w==&#34;,&#xA;      &#34;xYjfT47p5BaLoMKfWyn2HQ==&#34;,&#xA;      &#34;Lt2Hg7sVYgz0GD7ldFmjjA==&#34;,&#xA;      &#34;tYeLT/YUKIk7yaK07WvPeA==&#34;&#xA;    ],&#xA;    &#34;k4gCNgIfg7MM/e42ThRx2w==&#34;: [&#xA;      &#34;n83jaRl/T6kiaoMyWtX8xw==&#34;,&#xA;      &#34;AZQ9MHTiNLYiRU7sYZlVGw==&#34;&#xA;    ],&#xA;    &#34;ka4b0+TZOGmroTz/rrRQcg==&#34;: [&#xA;      &#34;+nHq7dak7Hkjcru/xpwzhQ==&#34;,&#xA;      &#34;L7QbkTbsy8v3tMfOqNsVKQ==&#34;&#xA;    ],&#xA;    &#34;kwc9NYOQig+qWs5qmBRL/w==&#34;: [&#xA;      &#34;xCUiEQAH1lfhrKtUxQDIYA==&#34;,&#xA;      &#34;HuOxI+pWjgGV0XsBvltzlg==&#34;,&#xA;      &#34;SHxE0qXbBmDEp/LL1ieJeA==&#34;,&#xA;      &#34;rEg00U8+//igCt+0+QBUhA==&#34;,&#xA;      &#34;jw1ZiDut5Ot+DyVFjCrixg==&#34;,&#xA;      &#34;673FKazcUiydbfN5c6amaw==&#34;,&#xA;      &#34;ZTGiJlkqcqrCLJSY/Sq8lA==&#34;,&#xA;      &#34;VsocCwaFpF6PzdX5PxR+sQ==&#34;,&#xA;      &#34;S7qx7a03HASsJhyQafvXjg==&#34;&#xA;    ],&#xA;    &#34;lU0MYRg2dg5wynl2dMGsgA==&#34;: [&#xA;      &#34;hfBpyVezkUAf98QWnlvzIA==&#34;&#xA;    ],&#xA;    &#34;mtrWxjnWyzrIFOuHVeUG6g==&#34;: [&#xA;      &#34;UoEFDYM+Gqf2mdRJh5HUFw==&#34;,&#xA;      &#34;8rxYDEPu2XxazQ3cBUhX0Q==&#34;,&#xA;      &#34;9uK7ZDYgFtqP786n0QunAg==&#34;,&#xA;      &#34;UMD4nV1Ky5C5eKUMgtnKzw==&#34;,&#xA;      &#34;W/DMqBRMDYVkVH3D67luGg==&#34;,&#xA;      &#34;XBiy/XVR6SoThCkYUmkD1g==&#34;,&#xA;      &#34;vx2N2RZTm7neux8kVlqgEg==&#34;&#xA;    ],&#xA;    &#34;oSDtB9GflLljTYeOAikyIQ==&#34;: [&#xA;      &#34;0fCtWwB6iclgRvIA+IqiJQ==&#34;,&#xA;      &#34;EiL50P2QSOoRA18XAAH6Pg==&#34;,&#xA;      &#34;EKs36DFwHVCzU/cF0Be9pQ==&#34;,&#xA;      &#34;xLIujTim86EomaRofe4tDg==&#34;,&#xA;      &#34;KaROgE0QmtiOixMG9Wi1RA==&#34;,&#xA;      &#34;ElIjMFAz33tt/XVMysRkdA==&#34;,&#xA;      &#34;jguV9kU5iHC5V/cF3+b/tg==&#34;,&#xA;      &#34;Oi3Y6I7JDcoQrQyH+jMXWw==&#34;,&#xA;      &#34;p2qAiuM4AsdQ5J4fBWvbBA==&#34;,&#xA;      &#34;iEGZHZXt8HWPSM5eJesddQ==&#34;,&#xA;      &#34;npBrFSWnZYxq9cizdfDfCQ==&#34;,&#xA;      &#34;ngbKDtxhn33NKWC2lhOQNQ==&#34;&#xA;    ],&#xA;    &#34;peUaHHW4E9Y6Nd8+gJR5cQ==&#34;: [&#xA;      &#34;eohUFw28jV3sGLZE2CBPXA==&#34;,&#xA;      &#34;H9Ud41wofJc/QlL6Rm7WkA==&#34;,&#xA;      &#34;avzu5SRbIjcduH4QdmZ1gg==&#34;,&#xA;      &#34;OgFGrvrnAoXXvapnatTrxQ==&#34;,&#xA;      &#34;XbpXfbeApuDuIKvY0/qWiA==&#34;,&#xA;      &#34;ruDQdx7OmIsgMCpioWbqOQ==&#34;,&#xA;      &#34;zMNYUY09QO2aCVD23XG4dw==&#34;,&#xA;      &#34;npQpPXYG8xMJ1LRSVSnKGA==&#34;,&#xA;      &#34;KCgCqCavM9U0xL+GHJqzSg==&#34;,&#xA;      &#34;Rfm1tD+QxSP/TVjKFDNabg==&#34;&#xA;    ],&#xA;    &#34;y1KXv1Wa0o6q+5/jJ4FmmA==&#34;: [&#xA;      &#34;RXjd5U95osIGXnqCa34Jkg==&#34;,&#xA;      &#34;HdAyLUATPStr/HXiy9fgQw==&#34;,&#xA;      &#34;92KuvWwbPhsQNPu0knrHAQ==&#34;,&#xA;      &#34;G7IyfoPhe9f8QzIGbOfn7Q==&#34;,&#xA;      &#34;TLOrmSYL76Du+GI4WD9gMQ==&#34;,&#xA;      &#34;7Puka2o1jq4jSr2Hekrfhg==&#34;,&#xA;      &#34;xjRJnKlNaH/FGi0NN5VKBQ==&#34;,&#xA;      &#34;yePhQ2wYSrZV2+z+gEbpRg==&#34;,&#xA;      &#34;EiJx6rOT8KoLX+Wu7/N6HQ==&#34;&#xA;    ],&#xA;    &#34;yI01txXPQZENPfjF45L+Zw==&#34;: [&#xA;      &#34;+nHq7dak7Hkjcru/xpwzhQ==&#34;,&#xA;      &#34;L7QbkTbsy8v3tMfOqNsVKQ==&#34;&#xA;    ],&#xA;    &#34;yX08xXm2MSxk7s6Ui2Z6BQ==&#34;: [&#xA;      &#34;H2CablNBrQ/I5AsUjk5xyw==&#34;,&#xA;      &#34;BooDzA4nzaDI1l3E5zAHgg==&#34;,&#xA;      &#34;1lUHOMB3ANHGWpqCBv9Ynw==&#34;,&#xA;      &#34;a067YUjLHWzR99JNl/RtGQ==&#34;,&#xA;      &#34;t3XJyztcU9aOXTMLI8NRmA==&#34;&#xA;    ]&#xA;  },&#xA;  &#34;enrichments&#34;: {}&#xA;}&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-clair-scan-pod | container step-oci-attach-report: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal&#xA;Attaching clair-report-amd64.json to quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625&#xA;Executing: oras attach --no-tty --format go-template={{.digest}} --registry-config /home/oras/auth.json --artifact-type application/vnd.redhat.clair-report+json quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625 clair-report-amd64.json:application/vnd.redhat.clair-report+json&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-clair-scan-pod | container step-conftest-vulnerabilities: &#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/tekton/home/clair-result-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 5,&#xA;&#x9;&#x9;&#34;warnings&#34;: [&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with high vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libarchive-3.3.3-6.el8_10 (CVE-2026-4424)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_high_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 1&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched high vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: python3-libs-3.6.8-75.el8_10 (CVE-2026-4786, CVE-2026-6100), java-17-openjdk-headless-1:17.0.18.0.8-1.el8 (CVE-2025-66293, CVE-2026-25646, CVE-2026-26740), platform-python-3.6.8-75.el8_10 (CVE-2026-4786, CVE-2026-6100), libcap-2.48-6.el8_9 (CVE-2026-4878)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_high_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 8&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with medium vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libarchive-3.3.3-6.el8_10 (CVE-2026-5121)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_medium_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 1&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched medium vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: libssh-0.9.6-16.el8_10 (CVE-2025-5351, CVE-2025-8114, CVE-2026-0964, CVE-2026-0966, CVE-2026-3731), libblkid-2.32.1-48.el8_10 (CVE-2026-27456), systemd-libs-239-82.el8_10.15 (CVE-2018-20839, CVE-2025-4598, CVE-2026-29111, CVE-2026-4105), libarchive-3.3.3-6.el8_10 (CVE-2024-57970, CVE-2025-25724, CVE-2025-60753, CVE-2026-4426, CVE-2026-5745), glib2-2.56.4-168.el8_10 (CVE-2025-14087, CVE-2025-14512, CVE-2026-1484, CVE-2026-1489), libmount-2.32.1-48.el8_10 (CVE-2026-27456), libuuid-2.32.1-48.el8_10 (CVE-2026-27456), avahi-libs-0.7-27.el8_10.1 (CVE-2024-52615, CVE-2024-52616, CVE-2025-59529, CVE-2025-68276, CVE-2025-68468, CVE-2025-68471, CVE-2026-24401, CVE-2026-34933), file-libs-5.33-27.el8_10 (CVE-2019-8905), tar-2:1.30-11.el8_10 (CVE-2025-45582, CVE-2025-64118, CVE-2026-33056, CVE-2026-5704), xz-libs-5.2.4-4.el8_6 (CVE-2026-34743), expat-2.5.0-1.el8_10 (CVE-2026-32776, CVE-2026-32777, CVE-2026-32778), libssh-config-0.9.6-16.el8_10 (CVE-2025-5351, CVE-2025-8114, CVE-2026-0964, CVE-2026-0966, CVE-2026-3731), libsmartcols-2.32.1-48.el8_10 (CVE-2026-27456), python3-libs-3.6.8-75.el8_10 (CVE-2025-11468, CVE-2025-12781, CVE-2025-13837, CVE-2025-15282, CVE-2025-4516, CVE-2025-6069, CVE-2025-8291, CVE-2026-0672, CVE-2026-1502, CVE-2026-3644, CVE-2026-4224, CVE-2026-5713), java-17-openjdk-headless-1:17.0.18.0.8-1.el8 (CVE-2025-28164, CVE-2025-64505, CVE-2025-64506, CVE-2026-22693, CVE-2026-22695, CVE-2026-22801, CVE-2026-23865, CVE-2026-33416, CVE-2026-33636, CVE-2026-34757), libzstd-1.4.4-1.el8 (CVE-2022-4899), coreutils-single-8.30-17.el8_10 (CVE-2025-5278), openldap-2.4.46-21.el8_10 (CVE-2026-22185), glibc-common-2.28-251.el8_10.31 (CVE-2026-4046, CVE-2026-4437), libcurl-7.61.1-34.el8_10.11 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805), glibc-minimal-langpack-2.28-251.el8_10.31 (CVE-2026-4046, CVE-2026-4437), libxml2-2.9.7-21.el8_10.3 (CVE-2025-9714, CVE-2026-0990, CVE-2026-1757), curl-7.61.1-34.el8_10.11 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805), python3-pip-wheel-9.0.3-24.el8 (CVE-2023-45803, CVE-2025-50181, CVE-2025-50182, CVE-2026-25645), libgcrypt-1.8.5-7.el8_6 (CVE-2019-12904, CVE-2024-2236), openssl-libs-1:1.1.1k-15.el8_6 (CVE-2023-0466, CVE-2026-28390), alsa-lib-1.2.10-2.el8 (CVE-2026-25068), cups-libs-1:2.2.6-67.el8_10 (CVE-2023-4504, CVE-2026-27447, CVE-2026-34978, CVE-2026-34979, CVE-2026-34980, CVE-2026-34990, CVE-2026-39314, CVE-2026-39316), platform-python-3.6.8-75.el8_10 (CVE-2025-11468, CVE-2025-12781, CVE-2025-13837, CVE-2025-15282, CVE-2025-4516, CVE-2025-6069, CVE-2025-8291, CVE-2026-0672, CVE-2026-1502, CVE-2026-3644, CVE-2026-4224, CVE-2026-5713), glibc-2.28-251.el8_10.31 (CVE-2026-4046, CVE-2026-4437), gnupg2-2.2.20-4.el8_10 (CVE-2025-68972)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_medium_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 120&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don&#39;t have a known fix at this time.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Vulnerabilities found: nss-3.112.0-4.el8_10 (CVE-2020-12413, CVE-2024-7531), gawk-4.2.1-4.el8 (CVE-2023-4156), libssh-0.9.6-16.el8_10 (CVE-2025-4878, CVE-2025-8277, CVE-2026-0965, CVE-2026-0967, CVE-2026-0968), systemd-libs-239-82.el8_10.15 (CVE-2021-3997), nss-util-3.112.0-4.el8_10 (CVE-2020-12413, CVE-2024-7531), libarchive-3.3.3-6.el8_10 (CVE-2018-1000879, CVE-2018-1000880, CVE-2025-1632, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917, CVE-2025-5918), glib2-2.56.4-168.el8_10 (CVE-2023-29499, CVE-2023-32611, CVE-2023-32636, CVE-2023-32665, CVE-2025-3360, CVE-2025-7039, CVE-2026-0988, CVE-2026-1485), sqlite-libs-3.26.0-20.el8_10 (CVE-2019-19244, CVE-2019-9936, CVE-2019-9937, CVE-2024-0232, CVE-2025-70873), avahi-libs-0.7-27.el8_10.1 (CVE-2017-6519), nss-sysinit-3.112.0-4.el8_10 (CVE-2020-12413, CVE-2024-7531), file-libs-5.33-27.el8_10 (CVE-2019-8906), ncurses-base-6.1-10.20180224.el8 (CVE-2018-19211, CVE-2020-19185, CVE-2020-19186, CVE-2020-19187, CVE-2020-19188, CVE-2020-19189, CVE-2020-19190, CVE-2021-39537, CVE-2023-50495), tar-2:1.30-11.el8_10 (CVE-2019-9923, CVE-2021-20193, CVE-2023-39804), shadow-utils-2:4.6-23.el8_10 (CVE-2024-56433), expat-2.5.0-1.el8_10 (CVE-2025-66382, CVE-2026-24515, CVE-2026-41080), libssh-config-0.9.6-16.el8_10 (CVE-2025-4878, CVE-2025-8277, CVE-2026-0965, CVE-2026-0967, CVE-2026-0968), python3-libs-3.6.8-75.el8_10 (CVE-2019-9674, CVE-2024-0397, CVE-2024-7592, CVE-2025-1795, CVE-2025-6075, CVE-2026-2297, CVE-2026-3479), nss-softokn-freebl-3.112.0-4.el8_10 (CVE-2020-12413, CVE-2024-7531), java-17-openjdk-headless-1:17.0.18.0.8-1.el8 (CVE-2022-3857, CVE-2026-27171), libzstd-1.4.4-1.el8 (CVE-2021-24032), gnutls-3.6.16-8.el8_10.5 (CVE-2021-4209), nss-softokn-3.112.0-4.el8_10 (CVE-2020-12413, CVE-2024-7531), ncurses-libs-6.1-10.20180224.el8 (CVE-2018-19211, CVE-2020-19185, CVE-2020-19186, CVE-2020-19187, CVE-2020-19188, CVE-2020-19189, CVE-2020-19190, CVE-2021-39537, CVE-2023-50495), glibc-common-2.28-251.el8_10.31 (CVE-2026-4438), libcurl-7.61.1-34.el8_10.11 (CVE-2023-27534, CVE-2024-11053, CVE-2024-7264, CVE-2025-14524, CVE-2025-14819, CVE-2025-15079, CVE-2025-15224), libstdc++-8.5.0-28.el8_10 (CVE-2018-20657, CVE-2019-14250, CVE-2022-27943), pcre2-10.32-3.el8_6 (CVE-2022-41409), libgcc-8.5.0-28.el8_10 (CVE-2018-20657, CVE-2019-14250, CVE-2022-27943), libtasn1-4.13-5.el8_10 (CVE-2018-1000654, CVE-2025-13151), glibc-minimal-langpack-2.28-251.el8_10.31 (CVE-2026-4438), libxml2-2.9.7-21.el8_10.3 (CVE-2023-45322, CVE-2024-34459, CVE-2025-27113, CVE-2025-6170, CVE-2026-0989, CVE-2026-0992), curl-7.61.1-34.el8_10.11 (CVE-2023-27534, CVE-2024-11053, CVE-2024-7264, CVE-2025-14524, CVE-2025-14819, CVE-2025-15079, CVE-2025-15224), python3-pip-wheel-9.0.3-24.el8 (CVE-2018-20225), openssl-libs-1:1.1.1k-15.el8_6 (CVE-2023-0464, CVE-2023-0465, CVE-2023-2650, CVE-2024-0727, CVE-2024-13176, CVE-2024-2511, CVE-2024-41996, CVE-2024-4741, CVE-2025-15468, CVE-2025-15469, CVE-2025-68160, CVE-2025-69418, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796, CVE-2026-2673, CVE-2026-28386, CVE-2026-28388, CVE-2026-28389, CVE-2026-31789), elfutils-libelf-0.190-2.el8 (CVE-2024-25260), dbus-libs-1:1.12.8-27.el8_10 (CVE-2020-35512), cups-libs-1:2.2.6-67.el8_10 (CVE-2021-25317), platform-python-3.6.8-75.el8_10 (CVE-2019-9674, CVE-2024-0397, CVE-2024-7592, CVE-2025-1795, CVE-2025-6075, CVE-2026-2297, CVE-2026-3479), glibc-2.28-251.el8_10.31 (CVE-2026-4438), gnupg2-2.2.20-4.el8_10 (CVE-2022-3219, CVE-2025-30258, CVE-2026-24883), zlib-1.2.11-25.el8 (CVE-2026-27171)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;clair_unpatched_low_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 148&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;]&#xA;&#x9;}&#xA;]&#xA;{&#34;vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:1,&#34;medium&#34;:1,&#34;low&#34;:0,&#34;unknown&#34;:0},&#34;unpatched_vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:8,&#34;medium&#34;:120,&#34;low&#34;:148,&#34;unknown&#34;:0}}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#34;, &#34;digests&#34;: [&#34;sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625&#34;]}}&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T14:00:34+00:00&#34;,&#34;note&#34;:&#34;Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA; pod: konflux-demo-component-kcal-on-push-f7qsx-clamav-scan-pod | init container: prepare&#xA;2026/04/19 14:00:13 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-kcal-on-push-f7qsx-clamav-scan-pod | init container: place-scripts&#xA;2026/04/19 14:00:14 Decoded script /tekton/scripts/script-0-6zjcw&#xA;2026/04/19 14:00:14 Decoded script /tekton/scripts/script-1-sbfcj&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-clamav-scan-pod | container step-extract-and-scan-image: &#xA;Starting clamd ...&#xA;clamd is ready!&#xA;Detecting artifact type for quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625.&#xA;Detected container image. Processing image manifests.&#xA;Running &#34;oc image extract&#34; on image of arch amd64&#xA;Scanning image for arch amd64. This operation may take a while.&#xA;&#xA;----------- SCAN SUMMARY -----------&#xA;Infected files: 0&#xA;Time: 51.448 sec (0 m 51 s)&#xA;Start Date: 2026:04:19 14:00:33&#xA;End Date:   2026:04:19 14:01:25&#xA;Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27975/Sat Apr 18 06:26:10 2026 Database version: 27975&#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 2&#xA;&#x9;}&#xA;]&#xA;{&#34;timestamp&#34;:&#34;1776607285&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1776607285&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1776607285&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#34;, &#34;digests&#34;: [&#34;sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625&#34;]}}&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-clamav-scan-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal&#xA;Attaching to quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958@sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;Preparing clamscan-result-amd64.log&#xA;Preparing clamscan-ec-test-amd64.json&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading 8602d60e2844 clamscan-result-amd64.log&#xA;Uploading afe70c7fefa7 clamscan-ec-test-amd64.json&#xA;Uploaded  afe70c7fefa7 clamscan-ec-test-amd64.json&#xA;Uploaded  8602d60e2844 clamscan-result-amd64.log&#xA;Uploading dc2f735178ce application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  dc2f735178ce application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958@sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625&#xA;Digest: sha256:dc2f735178ce273a2185770a27bc0ea2d4226a23e037976ce6e8d9c097bd34c2&#xA;&#xA; pod: konflux-demo-component-kcal-on-push-f7qsx-clone-repository-pod | init container: prepare&#xA;2026/04/19 13:53:12 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-kcal-on-push-f7qsx-clone-repository-pod | init container: place-scripts&#xA;2026/04/19 13:53:13 Decoded script /tekton/scripts/script-0-mgxff&#xA;2026/04/19 13:53:13 Decoded script /tekton/scripts/script-1-mnhpw&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-clone-repository-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1776606797.3590403,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1776606797.5732179,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo @ 1dc6580ea2177581106ef7a7bc3a5373b5412958 (grafted, HEAD) in path /var/workdir/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1776606797.5732567,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1776606797.5961015,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /var/workdir/source&#34;}&#xA;Merge option disabled. Using checked-out revision 1dc6580ea2177581106ef7a7bc3a5373b5412958 directly.&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-clone-repository-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-clone-repository-pod | container step-create-trusted-artifact: &#xA;Prepared artifact from /var/workdir/source (sha256:58cf784270f165085355f1ecd4e20ed0afb5d041bef39f1f0fc356c010ea208d)&#xA;Using token for quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal&#xA;Executing: oras push --registry-config /tmp/create-oci.sh.dpXj19/auth-mmeheK.json quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958.git SOURCE_ARTIFACT&#xA;Uploading 58cf784270f1 SOURCE_ARTIFACT&#xA;Uploaded  58cf784270f1 SOURCE_ARTIFACT&#xA;Pushed [registry] quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958.git&#xA;ArtifactType: application/vnd.unknown.artifact.v1&#xA;Digest: sha256:df05fd465f28807a73fd8af06355c121a153740af77cec3d1ca4144705440b83&#xA;Artifacts created&#xA;&#xA;&#xA; pod: konflux-demo-component-kcal-on-push-f7qsx-init-pod | init container: prepare&#xA;2026/04/19 13:53:05 Entrypoint initialization&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-init-pod | container step-init: &#xA;time=&#34;2026-04-19T13:53:09Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-19T13:53:09Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-19T13:53:09Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-19T13:53:09Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-19T13:53:09Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-19T13:53:09Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-19T13:53:09Z&#34; level=info msg=&#34;Cache proxy is disabled in param or in backend&#34;&#xA;time=&#34;2026-04-19T13:53:09Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-19T13:53:09Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: konflux-demo-component-kcal-on-push-f7qsx-push-dockerfile-pod | init container: prepare&#xA;2026/04/19 13:56:53 Entrypoint initialization&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-push-dockerfile-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.ryqBIZ/auth-yMURUj.json quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:58cf784270f165085355f1ecd4e20ed0afb5d041bef39f1f0fc356c010ea208d --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:58cf784270f165085355f1ecd4e20ed0afb5d041bef39f1f0fc356c010ea208d to /var/workdir/source&#xA;&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-push-dockerfile-pod | container step-push: &#xA;time=&#34;2026-04-19T13:57:11Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#34;&#xA;time=&#34;2026-04-19T13:57:11Z&#34; level=info msg=&#34;[param] image-digest: sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625&#34;&#xA;time=&#34;2026-04-19T13:57:11Z&#34; level=info msg=&#34;[param] containerfile: Dockerfile&#34;&#xA;time=&#34;2026-04-19T13:57:11Z&#34; level=info msg=&#34;[param] context: .&#34;&#xA;time=&#34;2026-04-19T13:57:11Z&#34; level=info msg=&#34;[param] tag-suffix: .dockerfile&#34;&#xA;time=&#34;2026-04-19T13:57:11Z&#34; level=info msg=&#34;[param] artifact-type: application/vnd.konflux.dockerfile&#34;&#xA;time=&#34;2026-04-19T13:57:11Z&#34; level=info msg=&#34;[param] source: source&#34;&#xA;time=&#34;2026-04-19T13:57:11Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-04-19T13:57:11Z&#34; level=info msg=&#34;[param] alternative-filename: Dockerfile&#34;&#xA;time=&#34;2026-04-19T13:57:12Z&#34; level=info msg=&#34;oras [stdout] quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:1363cdb50d89b98d455e82148e111ce652d57431a94a6faa96cb864bc4c85bba&#34; logger=CliExecutor&#xA;time=&#34;2026-04-19T13:57:12Z&#34; level=info msg=&#34;Containerfile &#39;/var/workdir/source/Dockerfile&#39; is pushed to registry with tag: sha256-f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625.dockerfile&#34;&#xA;{&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:1363cdb50d89b98d455e82148e111ce652d57431a94a6faa96cb864bc4c85bba&#34;}&#xA; pod: konflux-demo-component-kcal-on-push-f7qsx-sast-shell-check-pod | init container: prepare&#xA;2026/04/19 13:56:45 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-kcal-on-push-f7qsx-sast-shell-check-pod | init container: place-scripts&#xA;2026/04/19 13:56:45 Decoded script /tekton/scripts/script-1-gbdgw&#xA;2026/04/19 13:56:45 Decoded script /tekton/scripts/script-2-zf6lz&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-sast-shell-check-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.AMa3Ks/auth-lNDZIy.json quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:58cf784270f165085355f1ecd4e20ed0afb5d041bef39f1f0fc356c010ea208d --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:58cf784270f165085355f1ecd4e20ed0afb5d041bef39f1f0fc356c010ea208d to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-sast-shell-check-pod | container step-sast-shell-check: &#xA;+ source /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=konflux-demo-component-kcal&#xA;INFO: The PROJECT_NAME used is: konflux-demo-component-kcal&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: konflux-demo-component-kcal&#39;&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;++ rpm -q --queryformat &#39;%{NAME}-%{VERSION}-%{RELEASE}\n&#39; ShellCheck&#xA;+ PACKAGE_VERSION=ShellCheck-0.10.0-3.el9&#xA;+ OUTPUT_FILE=shellcheck-results.json&#xA;+ SOURCE_CODE_DIR=/var/workdir/source&#xA;+ declare -a ALL_TARGETS&#xA;+ IFS=,&#xA;+ read -ra TARGET_ARRAY&#xA;+ for d in &#34;${TARGET_ARRAY[@]}&#34;&#xA;+ potential_path=/var/workdir/source/.&#xA;++ realpath -m /var/workdir/source/.&#xA;+ resolved_path=/var/workdir/source&#xA;+ [[ /var/workdir/source == \/\v\a\r\/\w\o\r\k\d\i\r\/\s\o\u\r\c\e* ]]&#xA;+ ALL_TARGETS+=(&#34;$resolved_path&#34;)&#xA;+ &#39;[&#39; -z &#39;&#39; &#39;]&#39;&#xA;+ &#39;[&#39; -r /sys/fs/cgroup/cpu.max &#39;]&#39;&#xA;+ read -r quota period&#xA;+ &#39;[&#39; 800000 &#39;!=&#39; max &#39;]&#39;&#xA;+ &#39;[&#39; -n 100000 &#39;]&#39;&#xA;+ &#39;[&#39; 100000 -gt 0 &#39;]&#39;&#xA;+ export SC_JOBS=8&#xA;+ SC_JOBS=8&#xA;+ echo &#39;INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh&#39;&#xA;INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh&#xA;+ /usr/share/csmock/scripts/run-shellcheck.sh /var/workdir/source&#xA;Looking for shell scripts................ done&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/applypatch-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/post-update.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/prepare-commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-applypatch.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-merge-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-push.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-rebase.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-receive.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/push-to-checkout.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/sendemail-validate.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/update.sample&#xA;+ CSGREP_OPTS=(--mode=json --strip-path-prefix=&#34;$SOURCE_CODE_DIR&#34;/ --remove-duplicates --embed-context=3 --set-scan-prop=&#34;ShellCheck:${PACKAGE_VERSION}&#34;)&#xA;+ [[ true == \t\r\u\e ]]&#xA;+ CSGREP_EVENT_FILTER=&#39;\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2218|2224|2225|2242|2256|2258|2261)\]$&#39;&#xA;+ CSGREP_OPTS+=(--event=&#34;$CSGREP_EVENT_FILTER&#34;)&#xA;+ csgrep --mode=json --strip-path-prefix=/var/workdir/source/ --remove-duplicates --embed-context=3 --set-scan-prop=ShellCheck:ShellCheck-0.10.0-3.el9 &#39;--event=\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|2218|2224|2225|2242|2256|2258|2261)\]$&#39; ./shellcheck-results/empty.json ./shellcheck-results/sc-104.json ./shellcheck-results/sc-117.json ./shellcheck-results/sc-118.json ./shellcheck-results/sc-120.json ./shellcheck-results/sc-71.json ./shellcheck-results/sc-74.json ./shellcheck-results/sc-75.json ./shellcheck-results/sc-76.json ./shellcheck-results/sc-79.json ./shellcheck-results/sc-83.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;+ echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... + curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;ShellCheck results have been saved to shellcheck-results.json&#xA;+ echo &#39;ShellCheck results have been saved to shellcheck-results.json&#39;&#xA;+ csgrep --mode=evtstat shellcheck-results.json&#xA;+ csgrep --mode=sarif shellcheck-results.json&#xA;+ TEST_OUTPUT=&#xA;+ parse_test_output sast-shell-check-oci-ta sarif shellcheck-results.sarif&#xA;+ TEST_NAME=sast-shell-check-oci-ta&#xA;+ TEST_RESULT_FORMAT=sarif&#xA;+ TEST_RESULT_FILE=shellcheck-results.sarif&#xA;+ &#39;[&#39; -z sast-shell-check-oci-ta &#39;]&#39;&#xA;+ &#39;[&#39; -z sarif &#39;]&#39;&#xA;+ &#39;[&#39; -z shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; &#39;!&#39; -f shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; sarif = sarif &#39;]&#39;&#xA;+++ jq -rce &#39;(if (.runs[].results | length &gt; 0) then &#34;FAILURE&#34; else &#34;SUCCESS&#34; end)&#39; shellcheck-results.sarif&#xA;+++ jq -rce &#39;(.runs[].results | length)&#39; shellcheck-results.sarif&#xA;++ make_result_json -r SUCCESS -f 0&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ FAILURES=0&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-04-19T13:56:55+00:00 --arg result SUCCESS --arg note &#39;For details, check Tekton task log.&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:55+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:55+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ TEST_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:55+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:55+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ jq .failures&#xA;+ &#39;[&#39; 0 -gt 0 &#39;]&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:55+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:55+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-sast-shell-check-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal&#xA;Attaching to quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958@sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625 shellcheck-results.sarif:application/sarif+json&#xA;Preparing shellcheck-results.sarif&#xA;Uploading 3b606a9dd3a1 shellcheck-results.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploaded  3b606a9dd3a1 shellcheck-results.sarif&#xA;Uploading 34fe7f5c8073 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  34fe7f5c8073 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958@sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625&#xA;Digest: sha256:34fe7f5c807342e65750e0372b3850374d2a9670366ad467a911f4b0d38ced85&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: konflux-demo-component-kcal-on-push-f7qsx-sast-snyk-check-pod | init container: prepare&#xA;2026/04/19 13:56:45 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-kcal-on-push-f7qsx-sast-snyk-check-pod | init container: place-scripts&#xA;2026/04/19 13:56:45 Decoded script /tekton/scripts/script-1-xgf2l&#xA;2026/04/19 13:56:45 Decoded script /tekton/scripts/script-2-gnthn&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-sast-snyk-check-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.tRbeRc/auth-c1olm0.json quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:58cf784270f165085355f1ecd4e20ed0afb5d041bef39f1f0fc356c010ea208d --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:58cf784270f165085355f1ecd4e20ed0afb5d041bef39f1f0fc356c010ea208d to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-sast-snyk-check-pod | container step-sast-snyk-check: &#xA;INFO: The PROJECT_NAME used is: konflux-demo-component-kcal&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;{&#34;result&#34;:&#34;SKIPPED&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:56:54+00:00&#34;,&#34;note&#34;:&#34;Task sast-snyk-check-oci-ta skipped: If you wish to use the Snyk code SAST task, please create a secret name snyk-secret with the key &#39;snyk_token&#39; containing the Snyk token by following the steps given [here](https://konflux-ci.dev/docs/testing/build/snyk/)&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA;pod: konflux-demo-component-kcal-on-push-f7qsx-sast-snyk-check-pod | container step-upload: &#xA;No sast_snyk_check_out.sarif exists. Skipping upload.&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: konflux-demo-component-kcal1b00bcf9578e1067206035458a8966f7-pod | init container: prepare&#xA;2026/04/19 13:57:16 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-kcal1b00bcf9578e1067206035458a8966f7-pod | init container: place-scripts&#xA;2026/04/19 13:57:17 Decoded script /tekton/scripts/script-1-q65v6&#xA;2026/04/19 13:57:17 Decoded script /tekton/scripts/script-2-5z5lt&#xA;&#xA;pod: konflux-demo-component-kcal1b00bcf9578e1067206035458a8966f7-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.ytdEDW/auth-NQy4rH.json quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:58cf784270f165085355f1ecd4e20ed0afb5d041bef39f1f0fc356c010ea208d --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal@sha256:58cf784270f165085355f1ecd4e20ed0afb5d041bef39f1f0fc356c010ea208d to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: konflux-demo-component-kcal1b00bcf9578e1067206035458a8966f7-pod | container step-sast-unicode-check: &#xA;+ . /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=konflux-demo-component-kcal&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: konflux-demo-component-kcal&#39;&#xA;INFO: The PROJECT_NAME used is: konflux-demo-component-kcal&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;+ SCAN_PROP=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58&#xA;+ FUC_EXIT_CODE=0&#xA;+ LANG=en_US.utf8&#xA;+ find_unicode_control.py -p bidi -v -d -t /var/workdir/source&#xA;+ [[ 0 -ne 0 ]]&#xA;+ sed -i raw_sast_unicode_check_out.txt -E -e &#39;s|(.*:[0-9]+)(.*)|\1: warning:\2|&#39; -e &#39;s|^|Error: UNICONTROL_WARNING:\n|&#39;&#xA;+ CSGERP_OPTS=(--mode=json --remove-duplicates --embed-context=3 --set-scan-prop=&#34;${SCAN_PROP}&#34; --strip-path-prefix=&#34;${SOURCE_CODE_DIR}&#34;/source/)&#xA;+ csgrep --mode=json --remove-duplicates --embed-context=3 --set-scan-prop=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58 --strip-path-prefix=/var/workdir/source/ raw_sast_unicode_check_out.txt&#xA;+ csgrep --mode=evtstat processed_sast_unicode_check_out.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... + echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;+ curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;+ mv processed_sast_unicode_check_out.json sast_unicode_check_out.json&#xA;+ csgrep --mode=sarif sast_unicode_check_out.json&#xA;+ [[ 0 -eq 0 ]]&#xA;+ note=&#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39;&#xA;++ make_result_json -r SUCCESS -t &#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39;&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ NOTE=&#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39;&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-04-19T13:57:23+00:00 --arg result SUCCESS --arg note &#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:57:23+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:57:23+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ ERROR_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:57:23+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:57:23+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-04-19T13:57:23+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: konflux-demo-component-kcal1b00bcf9578e1067206035458a8966f7-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal&#xA;Attaching to quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958@sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625 sast_unicode_check_out.sarif:application/sarif+json&#xA;Preparing sast_unicode_check_out.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading 1da9b99b8b41 sast_unicode_check_out.sarif&#xA;Uploaded  1da9b99b8b41 sast_unicode_check_out.sarif&#xA;Uploading 79fa3b03a7d3 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  79fa3b03a7d3 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958@sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625&#xA;Digest: sha256:79fa3b03a7d3345baa636e6d8b43a794638fa5a08e7c19f0de51120a1fd87f28&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: konflux-demo-component-kcal377d78a5d9da7aba1604b00a9a6f1d60-pod | init container: prepare&#xA;2026/04/19 13:53:33 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-kcal377d78a5d9da7aba1604b00a9a6f1d60-pod | init container: place-scripts&#xA;2026/04/19 13:53:44 Decoded script /tekton/scripts/script-0-tvg4n&#xA;2026/04/19 13:53:44 Decoded script /tekton/scripts/script-2-bv68l&#xA;&#xA;pod: konflux-demo-component-kcal377d78a5d9da7aba1604b00a9a6f1d60-pod | container step-skip-ta: &#xA;&#xA;pod: konflux-demo-component-kcal377d78a5d9da7aba1604b00a9a6f1d60-pod | container step-use-trusted-artifact: &#xA;WARN: found skip file in /var/workdir/source&#xA;&#xA;&#xA;pod: konflux-demo-component-kcal377d78a5d9da7aba1604b00a9a6f1d60-pod | container step-prefetch-dependencies: &#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;time=&#34;2026-04-19T13:53:51Z&#34; level=debug msg=&#34;Starting prefetch-dependencies&#34;&#xA;time=&#34;2026-04-19T13:53:51Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-19T13:53:51Z&#34; level=info msg=&#34;Not using package registry proxy because allow-package-registry-proxy is not set to `true` on the cluster level&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-04-19T13:53:51Z&#34; level=info msg=&#34;[param] source-dir: /var/workdir/source&#34;&#xA;time=&#34;2026-04-19T13:53:51Z&#34; level=info msg=&#34;[param] output-dir: /var/workdir/cachi2/output&#34;&#xA;time=&#34;2026-04-19T13:53:51Z&#34; level=info msg=&#34;[param] sbom-format: spdx&#34;&#xA;time=&#34;2026-04-19T13:53:51Z&#34; level=info msg=&#34;[param] mode: strict&#34;&#xA;time=&#34;2026-04-19T13:53:51Z&#34; level=info msg=&#34;[param] output-dir-mount-point: /cachi2/output&#34;&#xA;time=&#34;2026-04-19T13:53:51Z&#34; level=info msg=&#34;[param] env-files: [/var/workdir/cachi2/cachi2.env]&#34;&#xA;time=&#34;2026-04-19T13:53:51Z&#34; level=info msg=&#34;[param] git-auth-directory: /workspace/git-basic-auth&#34;&#xA;time=&#34;2026-04-19T13:53:52Z&#34; level=info msg=&#34;hermeto [stdout] hermeto 0.50.1&#34; logger=CliExecutor&#xA;time=&#34;2026-04-19T13:53:52Z&#34; level=warning msg=&#34;No input provided; skipping prefetch-dependencies&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-04-19T13:53:52Z&#34; level=debug msg=&#34;Finished prefetch-dependencies&#34;&#xA;&#xA;pod: konflux-demo-component-kcal377d78a5d9da7aba1604b00a9a6f1d60-pod | container step-create-trusted-artifact: &#xA;WARN: found skip file in /var/workdir/source&#xA;WARN: found skip file in /var/workdir/cachi2&#xA;&#xA;&#xA; pod: konflux-demo-component-kcalce5425dbfd1c62f5d3c7529f63271d5f-pod | init container: prepare&#xA;2026/04/19 14:00:13 Entrypoint initialization&#xA;&#xA; pod: konflux-demo-component-kcalce5425dbfd1c62f5d3c7529f63271d5f-pod | init container: place-scripts&#xA;2026/04/19 14:00:13 Decoded script /tekton/scripts/script-0-cckbc&#xA;2026/04/19 14:00:13 Decoded script /tekton/scripts/script-1-lqbzx&#xA;2026/04/19 14:00:13 Decoded script /tekton/scripts/script-2-d9hfw&#xA;2026/04/19 14:00:13 Decoded script /tekton/scripts/script-3-s9chp&#xA;2026/04/19 14:00:13 Decoded script /tekton/scripts/script-4-4zzhv&#xA;2026/04/19 14:00:13 Decoded script /tekton/scripts/script-5-bnn76&#xA;&#xA;pod: konflux-demo-component-kcalce5425dbfd1c62f5d3c7529f63271d5f-pod | container step-introspect: &#xA;Artifact type will be determined by introspection.&#xA;Checking the media type of the OCI artifact...&#xA;[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#xA;The media type of the OCI artifact is application/vnd.docker.distribution.manifest.v2+json.&#xA;Looking for image labels that indicate this might be an operator bundle...&#xA;[retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#xA;Found 0 matching labels.&#xA;Expecting 3 or more to identify this image as an operator bundle.&#xA;Introspection concludes that this artifact is of type &#34;application&#34;.&#xA;&#xA;pod: konflux-demo-component-kcalce5425dbfd1c62f5d3c7529f63271d5f-pod | container step-generate-container-auth: &#xA;Selecting auth for quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#xA;Using token for quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal&#xA;Auth json written to &#34;/auth/auth.json&#34;.&#xA;&#xA;pod: konflux-demo-component-kcalce5425dbfd1c62f5d3c7529f63271d5f-pod | container step-set-skip-for-bundles: &#xA;2026/04/19 14:00:17 INFO Step was skipped due to when expressions were evaluated to false.&#xA;&#xA;pod: konflux-demo-component-kcalce5425dbfd1c62f5d3c7529f63271d5f-pod | container step-app-check: &#xA;time=&#34;2026-04-19T14:00:17Z&#34; level=info msg=&#34;certification library version&#34; version=&#34;1.17.1 &lt;commit: f7de82ae1c76e6c10ea94967d6b6a66f96248cbe&gt;&#34;&#xA;time=&#34;2026-04-19T14:00:18Z&#34; level=info msg=&#34;running checks for quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958 for platform amd64&#34;&#xA;time=&#34;2026-04-19T14:00:18Z&#34; level=info msg=&#34;target image&#34; image=&#34;quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#34;&#xA;time=&#34;2026-04-19T14:00:25Z&#34; level=info msg=&#34;warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-850932707/fs/licenses: no such file or directory&#34; check=HasLicense&#xA;time=&#34;2026-04-19T14:00:25Z&#34; level=info msg=&#34;check completed&#34; check=HasLicense result=FAILED&#xA;time=&#34;2026-04-19T14:00:25Z&#34; level=info msg=&#34;check completed&#34; check=HasUniqueTag result=PASSED&#xA;time=&#34;2026-04-19T14:00:25Z&#34; level=info msg=&#34;check completed&#34; check=LayerCountAcceptable result=PASSED&#xA;time=&#34;2026-04-19T14:00:26Z&#34; level=info msg=&#34;check completed&#34; check=HasNoProhibitedPackages result=PASSED&#xA;time=&#34;2026-04-19T14:00:26Z&#34; level=info msg=&#34;check completed&#34; check=HasRequiredLabel result=PASSED&#xA;time=&#34;2026-04-19T14:00:26Z&#34; level=info msg=&#34;USER 185 specified that is non-root&#34; check=RunAsNonRoot&#xA;time=&#34;2026-04-19T14:00:26Z&#34; level=info msg=&#34;check completed&#34; check=RunAsNonRoot result=PASSED&#xA;time=&#34;2026-04-19T14:00:35Z&#34; level=info msg=&#34;check completed&#34; check=HasModifiedFiles result=PASSED&#xA;time=&#34;2026-04-19T14:00:35Z&#34; level=info msg=&#34;check completed&#34; check=BasedOnUbi result=PASSED&#xA;time=&#34;2026-04-19T14:00:35Z&#34; level=info msg=&#34;This image&#39;s tag 1dc6580ea2177581106ef7a7bc3a5373b5412958 will be paired with digest sha256:f0ff358b512eda5911cbbf3fa9c6626dea34634679b8d5ff7e453e15dcb96625 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.&#34;&#xA;{&#xA;    &#34;image&#34;: &#34;quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#34;,&#xA;    &#34;passed&#34;: false,&#xA;    &#34;test_library&#34;: {&#xA;        &#34;name&#34;: &#34;github.com/redhat-openshift-ecosystem/openshift-preflight&#34;,&#xA;        &#34;version&#34;: &#34;1.17.1&#34;,&#xA;        &#34;commit&#34;: &#34;f7de82ae1c76e6c10ea94967d6b6a66f96248cbe&#34;&#xA;    },&#xA;    &#34;results&#34;: {&#xA;        &#34;passed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasUniqueTag&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has a tag other than &#39;latest&#39;, so that the image can be uniquely identified.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;LayerCountAcceptable&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasNoProhibitedPackages&#34;,&#xA;                &#34;elapsed_time&#34;: 43,&#xA;                &#34;description&#34;: &#34;Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasRequiredLabel&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;RunAsNonRoot&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasModifiedFiles&#34;,&#xA;                &#34;elapsed_time&#34;: 9144,&#xA;                &#34;description&#34;: &#34;Checks that no files installed via RPM in the base Red Hat layer have been modified&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;BasedOnUbi&#34;,&#xA;                &#34;elapsed_time&#34;: 156,&#xA;                &#34;description&#34;: &#34;Checking if the container&#39;s base image is based upon the Red Hat Universal Base Image (UBI)&#34;&#xA;            }&#xA;        ],&#xA;        &#34;failed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasLicense&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses&#34;,&#xA;                &#34;help&#34;: &#34;Check HasLicense encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            }&#xA;        ],&#xA;        &#34;errors&#34;: []&#xA;    }&#xA;}&#xA;time=&#34;2026-04-19T14:00:35Z&#34; level=info msg=&#34;Preflight result: FAILED&#34;&#xA;&#xA;pod: konflux-demo-component-kcalce5425dbfd1c62f5d3c7529f63271d5f-pod | container step-app-set-outcome: &#xA;{&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1776607235&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/konflux-kowk/konflux-demo-component-kcal:1dc6580ea2177581106ef7a7bc3a5373b5412958&#xA;&#xA;pod: konflux-demo-component-kcalce5425dbfd1c62f5d3c7529f63271d5f-pod | container step-final-outcome: &#xA;+ [[ ! -f /mount/konflux.results.json ]]&#xA;+ tee /tekton/steps/step-final-outcome/results/test-output&#xA;{&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1776607235&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}New PipelineRun konflux-demo-component-kcal-on-push-zt9t7 found after retrigger for component konflux-kowk/konflux-demo-component-kcal&#xA;PipelineRun konflux-demo-component-kcal-on-push-zt9t7 found for Component konflux-kowk/konflux-demo-component-kcal&#xA;PipelineRun konflux-demo-component-kcal-on-push-zt9t7 reason: ResolvingTaskRef&#xA;PipelineRun konflux-demo-component-kcal-on-push-zt9t7 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-zt9t7 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-zt9t7 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-zt9t7 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-zt9t7 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-zt9t7 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-zt9t7 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-zt9t7 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-zt9t7 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-zt9t7 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-zt9t7 reason: Completed&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: build PipelineRun finishedpipelineRunkonflux-demo-component-kcal-on-push-zt9t7headSHA1b30aef93d649ad133a86b6c9a2c0397a38a5a23&#34;&#xA;&lt; Exit [It] should eventually complete successfully - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:373 @ 04/19/26 14:05:30.994 (12m35.717s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should validate Tekton TaskRun test results successfully [konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.379468194">
              <system-err>&gt; Enter [It] should validate Tekton TaskRun test results successfully - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:389 @ 04/19/26 14:05:30.996&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: validating build PipelineRun TaskRun test resultscomponentkonflux-demo-component-kcalheadSHA1b30aef93d649ad133a86b6c9a2c0397a38a5a23&#34;&#xA;&lt; Exit [It] should validate Tekton TaskRun test results successfully - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:389 @ 04/19/26 14:05:31.375 (379ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should validate that the build pipelineRun is signed [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.037053213">
              <system-err>&gt; Enter [It] should validate that the build pipelineRun is signed - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:403 @ 04/19/26 14:05:31.376&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: validating build PipelineRun is signedcomponentkonflux-demo-component-kcal&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: build PipelineRun is signedpipelineRunkonflux-demo-component-kcal-on-push-zt9t7&#34;&#xA;&lt; Exit [It] should validate that the build pipelineRun is signed - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:403 @ 04/19/26 14:05:31.413 (37ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should find the related Snapshot CR [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007100613">
              <system-err>&gt; Enter [It] should find the related Snapshot CR - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:419 @ 04/19/26 14:05:31.413&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for Snapshot CRpipelineRunkonflux-demo-component-kcal-on-push-zt9t7namespacekonflux-kowk&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: Snapshot foundsnapshotkonflux-demo-app-20260419-140144-000&#34;&#xA;&lt; Exit [It] should find the related Snapshot CR - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:419 @ 04/19/26 14:05:31.42 (7ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should validate that the build pipelineRun is annotated with the name of the Snapshot [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.090993862">
              <system-err>&gt; Enter [It] should validate that the build pipelineRun is annotated with the name of the Snapshot - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:432 @ 04/19/26 14:05:31.421&#xA;&lt; Exit [It] should validate that the build pipelineRun is annotated with the name of the Snapshot - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:432 @ 04/19/26 14:05:31.512 (91ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should find the related Integration Test PipelineRun [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007506371">
              <system-err>&gt; Enter [It] should find the related Integration Test PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:441 @ 04/19/26 14:05:31.512&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for Integration Test PipelineRunscenariomy-integration-test-siacsnapshotkonflux-demo-app-20260419-140144-000&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: Integration Test PipelineRun foundpipelineRunmy-integration-test-siac-9ztcc&#34;&#xA;&lt; Exit [It] should find the related Integration Test PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:441 @ 04/19/26 14:05:31.519 (7ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when push pipelinerun is retriggered should eventually succeed [konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="220.121644592">
              <system-err>&gt; Enter [It] should eventually succeed - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:462 @ 04/19/26 14:05:31.52&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: triggering PaC build retriggercomponentkonflux-demo-component-kcal&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for retriggered PipelineRun to appearcomponentkonflux-demo-component-kcal&#34;&#xA;PipelineRun is not been retriggered yet for the component konflux-kowk/konflux-demo-component-kcal&#xA;&#34;msg&#34;=&#34;Konflux demo: GetComponentPipelineRunWithType (incoming) failed: no pipelinerun found for component konflux-demo-component-kcal&#34; &#34;error&#34;=null&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for retriggered build PipelineRun to finishpipelineRunkonflux-demo-component-kcal-on-push-hqc95&#34;&#xA;PipelineRun konflux-demo-component-kcal-on-push-hqc95 found for Component konflux-kowk/konflux-demo-component-kcal&#xA;PipelineRun konflux-demo-component-kcal-on-push-hqc95 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-hqc95 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-hqc95 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-hqc95 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-hqc95 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-hqc95 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-hqc95 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-hqc95 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-hqc95 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-hqc95 reason: Running&#xA;PipelineRun konflux-demo-component-kcal-on-push-hqc95 reason: Completed&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: retriggered build PipelineRun finishedpipelineRunkonflux-demo-component-kcal-on-push-hqc95&#34;&#xA;&lt; Exit [It] should eventually succeed - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:462 @ 04/19/26 14:09:11.641 (3m40.122s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Integration Test PipelineRun is created should eventually complete successfully [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.00694947">
              <system-err>&gt; Enter [It] should eventually complete successfully - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:493 @ 04/19/26 14:09:11.642&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for Integration pipeline to finishscenariomy-integration-test-siacsnapshotkonflux-demo-app-20260419-140144-000&#34;&#xA;PipelineRun my-integration-test-siac-9ztcc reason: Succeeded&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: Integration pipeline finishedsnapshotkonflux-demo-app-20260419-140144-000&#34;&#xA;&lt; Exit [It] should eventually complete successfully - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:493 @ 04/19/26 14:09:11.649 (7ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Integration Test PipelineRun completes successfully should lead to Snapshot CR being marked as passed [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.010716891">
              <system-err>&gt; Enter [It] should lead to Snapshot CR being marked as passed - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:505 @ 04/19/26 14:09:11.649&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for Snapshot to be marked as passedpipelineRunkonflux-demo-component-kcal-on-push-zt9t7&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: Snapshot marked as passedsnapshotkonflux-demo-app-20260419-140144-000&#34;&#xA;&lt; Exit [It] should lead to Snapshot CR being marked as passed - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:505 @ 04/19/26 14:09:11.66 (11ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Integration Test PipelineRun completes successfully should trigger creation of Release CR [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007729734">
              <system-err>&gt; Enter [It] should trigger creation of Release CR - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:518 @ 04/19/26 14:09:11.66&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for Release CRsnapshotkonflux-demo-app-20260419-140144-000namespacekonflux-kowk&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: Release CR createdreleasekonflux-demo-app-20260419-140144-000-1b30aef-lgsqv&#34;&#xA;&lt; Exit [It] should trigger creation of Release CR - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:518 @ 04/19/26 14:09:11.668 (8ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Release CR is created triggers creation of Release PipelineRun [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.067207208">
              <system-err>&gt; Enter [It] triggers creation of Release PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:533 @ 04/19/26 14:09:11.668&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for Release PipelineRun to startreleasekonflux-demo-app-20260419-140144-000-1b30aef-lgsqvmanagedNamespacekonflux-kowk-managed&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: Release PipelineRun startedpipelineRunmanaged-n9cms&#34;&#xA;&lt; Exit [It] triggers creation of Release PipelineRun - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:533 @ 04/19/26 14:09:11.735 (67ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Release PipelineRun is triggered should eventually succeed [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.006822837">
              <system-err>&gt; Enter [It] should eventually succeed - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:552 @ 04/19/26 14:09:11.736&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for Release PipelineRun to completereleasekonflux-demo-app-20260419-140144-000-1b30aef-lgsqvmanagedNamespacekonflux-kowk-managed&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: Release PipelineRun succeededreleasekonflux-demo-app-20260419-140144-000-1b30aef-lgsqv&#34;&#xA;&lt; Exit [It] should eventually succeed - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:552 @ 04/19/26 14:09:11.743 (7ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Release PipelineRun is completed should lead to Release CR being marked as succeeded [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="90.677125727">
              <system-err>&gt; Enter [It] should lead to Release CR being marked as succeeded - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:578 @ 04/19/26 14:09:11.743&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for Release CR to be marked as releasedreleasekonflux-demo-app-20260419-140144-000-1b30aef-lgsqvnamespacekonflux-kowk&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: Release CR marked as succeededreleasekonflux-demo-app-20260419-140144-000-1b30aef-lgsqv&#34;&#xA;&lt; Exit [It] should lead to Release CR being marked as succeeded - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:578 @ 04/19/26 14:09:11.75 (7ms)&#xA;&gt; Enter [AfterAll] Maven project - Default build - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:154 @ 04/19/26 14:09:11.75&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo AfterAll: cleaning up namespacesuserNamespacekonflux-kowkmanagedNamespacekonflux-kowk-managed&#34;&#xA;&#34;msg&#34;=&#34;Konflux demo AfterAll: failed to delete GitHub ref konflux-konflux-demo-component-kcal in repo hacbs-test-project-konflux-demo: DELETE https://api.github.com/repos/redhat-appstudio-qe/hacbs-test-project-konflux-demo/git/refs/heads/konflux-konflux-demo-component-kcal: 422 Reference does not exist []&#34; &#34;error&#34;=null&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo AfterAll: cleanup finishedcomponentRepositoryNamehacbs-test-project-konflux-demo&#34;&#xA;&lt; Exit [AfterAll] Maven project - Default build - /tmp/tmp.Z3cR7n2baf/tests/konflux-demo/konflux-demo.go:154 @ 04/19/26 14:10:42.42 (1m30.67s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A creates the Component A successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="63.322733033">
              <system-err>&gt; Enter [BeforeAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:60 @ 04/19/26 13:50:24.469&#xA;Successfully acquired repository lock for namespace group-tmhy&#xA;&lt; Exit [BeforeAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:60 @ 04/19/26 13:50:37.73 (13.261s)&#xA;&gt; Enter [It] creates the Component A successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:205 @ 04/19/26 13:50:37.73&#xA;Image repository for component go-component-vygkmq in namespace group-tmhy do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component go-component-vygkmq in namespace group-tmhy do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component go-component-vygkmq in namespace group-tmhy do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component go-component-vygkmq in namespace group-tmhy do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates the Component A successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:205 @ 04/19/26 13:51:27.791 (50.061s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 13:51:27.791&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 13:51:27.791 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A triggers a Build PipelineRun for componentA go-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="40.036842485">
              <system-err>&gt; Enter [It] triggers a Build PipelineRun for componentA go-component - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:213 @ 04/19/26 13:51:27.792&#xA;Build PipelineRun has not been created yet for the componentA group-tmhy/go-component-vygkmq&#xA;Build PipelineRun has not been created yet for the componentA group-tmhy/go-component-vygkmq&#xA;&lt; Exit [It] triggers a Build PipelineRun for componentA go-component - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:213 @ 04/19/26 13:52:07.829 (40.037s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 13:52:07.829&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 13:52:07.829 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A does not contain an annotation with a Snapshot Name [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000215174">
              <system-err>&gt; Enter [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:227 @ 04/19/26 13:52:07.829&#xA;&lt; Exit [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:227 @ 04/19/26 13:52:07.829 (0s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 13:52:07.829&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 13:52:07.829 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A should lead to build PipelineRunA finishing successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="580.016967165">
              <system-err>&gt; Enter [It] should lead to build PipelineRunA finishing successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:231 @ 04/19/26 13:52:07.83&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp found for Component group-tmhy/go-component-vygkmq&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Running&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Completed&#xA;&lt; Exit [It] should lead to build PipelineRunA finishing successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:231 @ 04/19/26 14:01:47.846 (9m40.017s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:01:47.846&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:01:47.846 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A should lead to a PaC PR creation for componentA go-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.32397779">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for componentA go-component - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:236 @ 04/19/26 14:01:47.847&#xA;&lt; Exit [It] should lead to a PaC PR creation for componentA go-component - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:236 @ 04/19/26 14:01:48.171 (324ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:01:48.171&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:01:48.171 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLRA is finished successfully checks if the Snapshot is created [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="20.017124898">
              <system-err>&gt; Enter [It] checks if the Snapshot is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:258 @ 04/19/26 14:01:48.171&#xA;unable to get the Snapshot within the namespace group-tmhy. Error: no snapshot found for component &#39;go-component-vygkmq&#39;, pipelineRun &#39;go-component-vygkmq-on-pull-request-qvlkp&#39; in &#39;group-tmhy&#39; namespace&#xA;&lt; Exit [It] checks if the Snapshot is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:258 @ 04/19/26 14:02:08.188 (20.017s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:02:08.188&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:02:08.188 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLRA is finished successfully should find the related Integration PipelineRuns [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.03533647">
              <system-err>&gt; Enter [It] should find the related Integration PipelineRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:263 @ 04/19/26 14:02:08.189&#xA;&lt; Exit [It] should find the related Integration PipelineRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:263 @ 04/19/26 14:02:08.224 (35ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:02:08.224&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:02:08.224 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLRA is finished successfully integration pipeline should end up with success [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.03156515">
              <system-err>&gt; Enter [It] integration pipeline should end up with success - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:270 @ 04/19/26 14:02:08.224&#xA;PipelineRun integration-resolver-pipelinerun-75dd4 reason: Succeeded&#xA;&lt; Exit [It] integration pipeline should end up with success - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:270 @ 04/19/26 14:02:08.256 (31ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:02:08.256&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:02:08.256 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Snapshot testing is completed successfully should merge the init PaC PR successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="1.562335559">
              <system-err>&gt; Enter [It] should merge the init PaC PR successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:277 @ 04/19/26 14:02:08.256&#xA;merged result sha: 797729c4dc08f74e00de98db849dae954965bc36 for PR #21081&#xA;&lt; Exit [It] should merge the init PaC PR successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:277 @ 04/19/26 14:02:09.818 (1.562s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:02:09.818&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:02:09.818 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B creates the Component B successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="10.056889145">
              <system-err>&gt; Enter [It] creates the Component B successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:296 @ 04/19/26 14:02:09.819&#xA;&lt; Exit [It] creates the Component B successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:296 @ 04/19/26 14:02:19.876 (10.056s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:02:19.876&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:02:19.876 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B triggers a Build PipelineRun for component python-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="20.038550173">
              <system-err>&gt; Enter [It] triggers a Build PipelineRun for component python-component - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:304 @ 04/19/26 14:02:19.876&#xA;Build PipelineRun has not been created yet for the componentB group-tmhy/python-component-ltwxkn&#xA;&lt; Exit [It] triggers a Build PipelineRun for component python-component - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:304 @ 04/19/26 14:02:39.915 (20.038s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:02:39.915&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:02:39.915 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B does not contain an annotation with a Snapshot Name [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000320976">
              <system-err>&gt; Enter [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:318 @ 04/19/26 14:02:39.915&#xA;&lt; Exit [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:318 @ 04/19/26 14:02:39.915 (0s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:02:39.916&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:02:39.916 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B should lead to build PipelineRun finishing successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="380.020240191">
              <system-err>&gt; Enter [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:322 @ 04/19/26 14:02:39.916&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 found for Component group-tmhy/python-component-ltwxkn&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun python-component-ltwxkn-on-pull-request-985h4 reason: Running&#xA;PipelineRun integration-resolver-pipelinerun-58sdg reason: Succeeded&#xA;&lt; Exit [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:322 @ 04/19/26 14:08:59.936 (6m20.02s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:08:59.936&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:08:59.936 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B should lead to a PaC PR creation for component python-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.397195301">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for component python-component - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:327 @ 04/19/26 14:08:59.937&#xA;&lt; Exit [It] should lead to a PaC PR creation for component python-component - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:327 @ 04/19/26 14:09:00.333 (397ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:09:00.334&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:09:00.334 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully checks if the Snapshot is created [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.009315684">
              <system-err>&gt; Enter [It] checks if the Snapshot is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:349 @ 04/19/26 14:09:00.334&#xA;&lt; Exit [It] checks if the Snapshot is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:349 @ 04/19/26 14:09:00.343 (9ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:09:00.343&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:09:00.343 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully should find the related Integration PipelineRuns [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.084215295">
              <system-err>&gt; Enter [It] should find the related Integration PipelineRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:354 @ 04/19/26 14:09:00.344&#xA;&lt; Exit [It] should find the related Integration PipelineRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:354 @ 04/19/26 14:09:00.428 (84ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:09:00.428&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:09:00.428 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully integration pipeline should end up with success [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.006576893">
              <system-err>&gt; Enter [It] integration pipeline should end up with success - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:361 @ 04/19/26 14:09:00.428&#xA;PipelineRun integration-resolver-pipelinerun-58sdg reason: Succeeded&#xA;&lt; Exit [It] integration pipeline should end up with success - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:361 @ 04/19/26 14:09:00.435 (6ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:09:00.435&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:09:00.435 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Snapshot testing is completed successfully should merge the init PaC PR successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="1.53546593">
              <system-err>&gt; Enter [It] should merge the init PaC PR successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:368 @ 04/19/26 14:09:00.435&#xA;merged result sha: ca5e910f8aaa7126218d66c68d766629b8b98494 for PR #21082&#xA;&lt; Exit [It] should merge the init PaC PR successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:368 @ 04/19/26 14:09:01.97 (1.535s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:09:01.97&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:09:01.97 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C creates the Component C successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="10.029546996">
              <system-err>&gt; Enter [It] creates the Component C successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:387 @ 04/19/26 14:09:01.971&#xA;&lt; Exit [It] creates the Component C successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:387 @ 04/19/26 14:09:12 (10.029s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:09:12&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:09:12 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C triggers a Build PipelineRun for componentC konflux-test-integration-clone [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="20.027846884">
              <system-err>&gt; Enter [It] triggers a Build PipelineRun for componentC konflux-test-integration-clone - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:395 @ 04/19/26 14:09:12.001&#xA;Build PipelineRun has not been created yet for the componentC group-tmhy/konflux-test-integration-clone-nzptub&#xA;&lt; Exit [It] triggers a Build PipelineRun for componentC konflux-test-integration-clone - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:395 @ 04/19/26 14:09:32.028 (20.027s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:09:32.029&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:09:32.029 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C does not contain an annotation with a Snapshot Name [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000274016">
              <system-err>&gt; Enter [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:409 @ 04/19/26 14:09:32.029&#xA;&lt; Exit [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:409 @ 04/19/26 14:09:32.029 (0s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:09:32.029&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:09:32.029 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C should lead to build PipelineRun finishing successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="200.020540461">
              <system-err>&gt; Enter [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:413 @ 04/19/26 14:09:32.03&#xA;PipelineRun konflux-test-integration-clone-nzptub-on-pull-request-j669r found for Component group-tmhy/konflux-test-integration-clone-nzptub&#xA;PipelineRun konflux-test-integration-clone-nzptub-on-pull-request-j669r reason: Running&#xA;PipelineRun konflux-test-integration-clone-nzptub-on-pull-request-j669r reason: Running&#xA;PipelineRun konflux-test-integration-clone-nzptub-on-pull-request-j669r reason: Running&#xA;PipelineRun konflux-test-integration-clone-nzptub-on-pull-request-j669r reason: Running&#xA;PipelineRun konflux-test-integration-clone-nzptub-on-pull-request-j669r reason: Running&#xA;PipelineRun konflux-test-integration-clone-nzptub-on-pull-request-j669r reason: Running&#xA;PipelineRun konflux-test-integration-clone-nzptub-on-pull-request-j669r reason: Running&#xA;PipelineRun konflux-test-integration-clone-nzptub-on-pull-request-j669r reason: Running&#xA;PipelineRun konflux-test-integration-clone-nzptub-on-pull-request-j669r reason: Running&#xA;PipelineRun integration-resolver-pipelinerun-7lkf9 reason: Running&#xA;PipelineRun integration-resolver-pipelinerun-7lkf9 reason: Succeeded&#xA;&lt; Exit [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:413 @ 04/19/26 14:12:52.05 (3m20.02s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:52.05&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:52.05 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C should lead to a PaC PR creation for componentC konflux-test-integration-clone [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.410681782">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for componentC konflux-test-integration-clone - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:418 @ 04/19/26 14:12:52.051&#xA;&lt; Exit [It] should lead to a PaC PR creation for componentC konflux-test-integration-clone - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:418 @ 04/19/26 14:12:52.461 (410ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:52.461&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:52.461 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully checks if the Snapshot is created [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.008780889">
              <system-err>&gt; Enter [It] checks if the Snapshot is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:440 @ 04/19/26 14:12:52.462&#xA;&lt; Exit [It] checks if the Snapshot is created - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:440 @ 04/19/26 14:12:52.47 (9ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:52.47&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:52.47 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully should find the related Integration PipelineRuns [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.086867563">
              <system-err>&gt; Enter [It] should find the related Integration PipelineRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:445 @ 04/19/26 14:12:52.471&#xA;&lt; Exit [It] should find the related Integration PipelineRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:445 @ 04/19/26 14:12:52.557 (87ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:52.558&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:52.558 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully integration pipeline should end up with success [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.100211025">
              <system-err>&gt; Enter [It] integration pipeline should end up with success - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:452 @ 04/19/26 14:12:52.558&#xA;PipelineRun integration-resolver-pipelinerun-7lkf9 reason: Succeeded&#xA;&lt; Exit [It] integration pipeline should end up with success - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:452 @ 04/19/26 14:12:52.658 (100ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:52.658&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:52.658 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Snapshot testing is completed successfully should merge the init PaC PR successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="1.6228800479999999">
              <system-err>&gt; Enter [It] should merge the init PaC PR successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:459 @ 04/19/26 14:12:52.659&#xA;merged result sha: 79f6fda071c6dae6544bcb2247bedd00f84a5252 for PR #8804&#xA;&lt; Exit [It] should merge the init PaC PR successfully - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:459 @ 04/19/26 14:12:54.281 (1.623s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:54.281&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:54.281 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged should make change to the root folder [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="2.372772056">
              <system-err>&gt; Enter [It] should make change to the root folder - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:479 @ 04/19/26 14:12:54.282&#xA;PR #21083 got created with sha e5b75e952d2793b52fb80ca131c4ee70b96cefc9&#xA;&lt; Exit [It] should make change to the root folder - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:479 @ 04/19/26 14:12:56.654 (2.372s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:56.654&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:56.655 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged should make change to the multiple-repo [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="1.7772502110000001">
              <system-err>&gt; Enter [It] should make change to the multiple-repo - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:497 @ 04/19/26 14:12:56.655&#xA;PR #8805 got created with sha 5a682e7f86a99e66eba38a4372fd950ce4dd86da&#xA;&lt; Exit [It] should make change to the multiple-repo - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:497 @ 04/19/26 14:12:58.432 (1.777s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:58.432&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:58.432 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged wait for the last components build to finish [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.042614737">
              <system-err>&gt; Enter [It] wait for the last components build to finish - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:513 @ 04/19/26 14:12:58.433&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp found for Component group-tmhy/go-component-vygkmq&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Completed&#xA;PipelineRun integration-resolver-pipelinerun-58sdg found for Component group-tmhy/python-component-ltwxkn&#xA;PipelineRun integration-resolver-pipelinerun-58sdg reason: Succeeded&#xA;PipelineRun integration-resolver-pipelinerun-7lkf9 found for Component group-tmhy/konflux-test-integration-clone-nzptub&#xA;PipelineRun integration-resolver-pipelinerun-7lkf9 reason: Succeeded&#xA;&lt; Exit [It] wait for the last components build to finish - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:513 @ 04/19/26 14:12:58.475 (42ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:58.475&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:58.475 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged wait for all component snapshots to be created with proper PR group annotations [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.008629209">
              <system-err>&gt; Enter [It] wait for all component snapshots to be created with proper PR group annotations - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:521 @ 04/19/26 14:12:58.476&#xA;Component snapshot integ-app-hmxi-20260419-135154-000 has PR group annotation: konflux-go-component-vygkmq&#xA;Component snapshot integ-app-hmxi-20260419-140221-000 is missing PR group annotation&#xA;Component snapshot integ-app-hmxi-20260419-140225-000 has PR group annotation: konflux-python-component-ltwxkn&#xA;Component snapshot integ-app-hmxi-20260419-140916-000 has PR group annotation: konflux-konflux-test-integration-clone-nzptub&#xA;All component snapshots are ready with PR group annotations&#xA;&lt; Exit [It] wait for all component snapshots to be created with proper PR group annotations - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:521 @ 04/19/26 14:12:58.484 (8ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:58.484&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:12:58.484 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged get all group snapshots and check if pr-group annotation contains all components [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="330.501703373">
              <system-err>&gt; Enter [It] get all group snapshots and check if pr-group annotation contains all components - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:556 @ 04/19/26 14:12:58.485&#xA;Attempting to find group snapshots for application integ-app-hmxi in namespace group-tmhy&#xA;Found 4 component snapshots:&#xA;PR Groups found: map[konflux-go-component-vygkmq:1 konflux-konflux-test-integration-clone-nzptub:1 konflux-python-component-ltwxkn:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-hmxi in namespace group-tmhy&#xA;Found 4 component snapshots:&#xA;PR Groups found: map[konflux-go-component-vygkmq:1 konflux-konflux-test-integration-clone-nzptub:1 konflux-python-component-ltwxkn:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-hmxi in namespace group-tmhy&#xA;Found 4 component snapshots:&#xA;PR Groups found: map[konflux-go-component-vygkmq:1 konflux-konflux-test-integration-clone-nzptub:1 konflux-python-component-ltwxkn:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-hmxi in namespace group-tmhy&#xA;Found 5 component snapshots:&#xA;PR Groups found: map[konflux-go-component-vygkmq:1 konflux-konflux-test-integration-clone-nzptub:1 konflux-python-component-ltwxkn:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-hmxi in namespace group-tmhy&#xA;Found 5 component snapshots:&#xA;PR Groups found: map[konflux-go-component-vygkmq:1 konflux-konflux-test-integration-clone-nzptub:1 konflux-python-component-ltwxkn:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-hmxi in namespace group-tmhy&#xA;Found 5 component snapshots:&#xA;PR Groups found: map[konflux-go-component-vygkmq:1 konflux-konflux-test-integration-clone-nzptub:1 konflux-python-component-ltwxkn:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-hmxi in namespace group-tmhy&#xA;Found 6 component snapshots:&#xA;PR Groups found: map[konflux-go-component-vygkmq:1 konflux-konflux-test-integration-clone-nzptub:1 konflux-python-component-ltwxkn:1 pr-branch-nifekg:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-hmxi in namespace group-tmhy&#xA;Found 6 component snapshots:&#xA;PR Groups found: map[konflux-go-component-vygkmq:1 konflux-konflux-test-integration-clone-nzptub:1 konflux-python-component-ltwxkn:1 pr-branch-nifekg:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-hmxi in namespace group-tmhy&#xA;Found 6 component snapshots:&#xA;PR Groups found: map[konflux-go-component-vygkmq:1 konflux-konflux-test-integration-clone-nzptub:1 konflux-python-component-ltwxkn:1 pr-branch-nifekg:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-hmxi in namespace group-tmhy&#xA;Found 6 component snapshots:&#xA;PR Groups found: map[konflux-go-component-vygkmq:1 konflux-konflux-test-integration-clone-nzptub:1 konflux-python-component-ltwxkn:1 pr-branch-nifekg:1]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-hmxi in namespace group-tmhy&#xA;Found 7 component snapshots:&#xA;PR Groups found: map[konflux-go-component-vygkmq:1 konflux-konflux-test-integration-clone-nzptub:1 konflux-python-component-ltwxkn:1 pr-branch-nifekg:2]&#xA;No group snapshots found yet. Component snapshots may not have been processed by integration service controller yet.&#xA;Attempting to find group snapshots for application integ-app-hmxi in namespace group-tmhy&#xA;Found 8 component snapshots:&#xA;PR Groups found: map[konflux-go-component-vygkmq:1 konflux-konflux-test-integration-clone-nzptub:1 konflux-python-component-ltwxkn:1 pr-branch-nifekg:3]&#xA;Found 1 group snapshots!&#xA;  Group Snapshot 0: integ-app-hmxi-20260419-141825-976 (type: group)&#xA;    Group Test Info: [{&#34;namespace&#34;:&#34;group-tmhy&#34;,&#34;component&#34;:&#34;konflux-test-integration-clone-nzptub&#34;,&#34;buildPipelineRun&#34;:&#34;konflux-test-integration-clone-nzptub-on-pull-request-5zdqc&#34;,&#34;snapshot&#34;:&#34;integ-app-hmxi-20260419-141302-000&#34;,&#34;repoUrl&#34;:&#34;https://github.com/redhat-appstudio-qe/konflux-test-integration-clone&#34;,&#34;pullRequestNumber&#34;:&#34;8805&#34;},{&#34;namespace&#34;:&#34;group-tmhy&#34;,&#34;component&#34;:&#34;go-component-vygkmq&#34;,&#34;buildPipelineRun&#34;:&#34;go-component-vygkmq-on-pull-request-w48sb&#34;,&#34;snapshot&#34;:&#34;integ-app-hmxi-20260419-141301-000-e4&#34;,&#34;repoUrl&#34;:&#34;https://github.com/redhat-appstudio-qe/group-snapshot-multi-component&#34;,&#34;pullRequestNumber&#34;:&#34;21083&#34;},{&#34;namespace&#34;:&#34;group-tmhy&#34;,&#34;component&#34;:&#34;python-component-ltwxkn&#34;,&#34;buildPipelineRun&#34;:&#34;python-component-ltwxkn-on-pull-request-b97xj&#34;,&#34;snapshot&#34;:&#34;integ-app-hmxi-20260419-141301-000&#34;,&#34;repoUrl&#34;:&#34;https://github.com/redhat-appstudio-qe/group-snapshot-multi-component&#34;,&#34;pullRequestNumber&#34;:&#34;21083&#34;}]&#xA;Validating group test info annotation: [{&#34;namespace&#34;:&#34;group-tmhy&#34;,&#34;component&#34;:&#34;konflux-test-integration-clone-nzptub&#34;,&#34;buildPipelineRun&#34;:&#34;konflux-test-integration-clone-nzptub-on-pull-request-5zdqc&#34;,&#34;snapshot&#34;:&#34;integ-app-hmxi-20260419-141302-000&#34;,&#34;repoUrl&#34;:&#34;https://github.com/redhat-appstudio-qe/konflux-test-integration-clone&#34;,&#34;pullRequestNumber&#34;:&#34;8805&#34;},{&#34;namespace&#34;:&#34;group-tmhy&#34;,&#34;component&#34;:&#34;go-component-vygkmq&#34;,&#34;buildPipelineRun&#34;:&#34;go-component-vygkmq-on-pull-request-w48sb&#34;,&#34;snapshot&#34;:&#34;integ-app-hmxi-20260419-141301-000-e4&#34;,&#34;repoUrl&#34;:&#34;https://github.com/redhat-appstudio-qe/group-snapshot-multi-component&#34;,&#34;pullRequestNumber&#34;:&#34;21083&#34;},{&#34;namespace&#34;:&#34;group-tmhy&#34;,&#34;component&#34;:&#34;python-component-ltwxkn&#34;,&#34;buildPipelineRun&#34;:&#34;python-component-ltwxkn-on-pull-request-b97xj&#34;,&#34;snapshot&#34;:&#34;integ-app-hmxi-20260419-141301-000&#34;,&#34;repoUrl&#34;:&#34;https://github.com/redhat-appstudio-qe/group-snapshot-multi-component&#34;,&#34;pullRequestNumber&#34;:&#34;21083&#34;}]&#xA;Group snapshot validation completed successfully&#xA;&lt; Exit [It] get all group snapshots and check if pr-group annotation contains all components - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:556 @ 04/19/26 14:18:28.986 (5m30.501s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:18:28.986&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:18:28.986 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged make sure that group snapshot contains last build pipelinerun for each component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.214978506">
              <system-err>&gt; Enter [It] make sure that group snapshot contains last build pipelinerun for each component - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:635 @ 04/19/26 14:18:28.987&#xA;&lt; Exit [It] make sure that group snapshot contains last build pipelinerun for each component - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:635 @ 04/19/26 14:18:29.201 (214ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:18:29.202&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:18:29.202 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created make change to the multiple-repo to trigger a new cycle of testing [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.570889958">
              <system-err>&gt; Enter [It] make change to the multiple-repo to trigger a new cycle of testing - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:648 @ 04/19/26 14:18:29.202&#xA;&lt; Exit [It] make change to the multiple-repo to trigger a new cycle of testing - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:648 @ 04/19/26 14:18:29.773 (570ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:18:29.773&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:18:29.773 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created wait for the components A and B build to finish [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.039276697">
              <system-err>&gt; Enter [It] wait for the components A and B build to finish - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:654 @ 04/19/26 14:18:29.774&#xA;Waiting for build pipelineRun to be created for app group-tmhy/integ-app-hmxi, sha: 71f866ab63bc53b52ad83f74c52078bfeef319c7&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp found for Component group-tmhy/go-component-vygkmq&#xA;PipelineRun go-component-vygkmq-on-pull-request-qvlkp reason: Completed&#xA;PipelineRun integration-resolver-pipelinerun-58sdg found for Component group-tmhy/python-component-ltwxkn&#xA;PipelineRun integration-resolver-pipelinerun-58sdg reason: Succeeded&#xA;&lt; Exit [It] wait for the components A and B build to finish - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:654 @ 04/19/26 14:18:29.812 (39ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:18:29.813&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:18:29.813 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created get all component snapshots for component A and check if older snapshot has been cancelled [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="340.807579467">
              <system-err>&gt; Enter [It] get all component snapshots for component A and check if older snapshot has been cancelled - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:663 @ 04/19/26 14:18:29.814&#xA;&lt; Exit [It] get all component snapshots for component A and check if older snapshot has been cancelled - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:663 @ 04/19/26 14:24:10.621 (5m40.807s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:24:10.621&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:24:10.621 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created get all group snapshots and check if older group snapshot is cancelled [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="20.092112098">
              <system-err>&gt; Enter [It] get all group snapshots and check if older group snapshot is cancelled - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:690 @ 04/19/26 14:24:10.621&#xA;&lt; Exit [It] get all group snapshots and check if older group snapshot is cancelled - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:690 @ 04/19/26 14:24:30.713 (20.092s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:24:30.713&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:24:30.713 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when ResolutionRequest is deleted after pipeline completes verifies that ResolutionRequest is deleted after pipeline resolution [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.225373634">
              <system-err>&gt; Enter [It] verifies that ResolutionRequest is deleted after pipeline resolution - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:720 @ 04/19/26 14:24:30.714&#xA;&lt; Exit [It] verifies that ResolutionRequest is deleted after pipeline resolution - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:720 @ 04/19/26 14:24:30.939 (225ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:24:30.94&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:24:30.94 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when ResolutionRequest is deleted after pipeline completes verifies that no orphaned ResolutionRequests remain in namespace after test completion [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="0.216975076">
              <system-err>&gt; Enter [It] verifies that no orphaned ResolutionRequests remain in namespace after test completion - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:740 @ 04/19/26 14:24:30.94&#xA;&lt; Exit [It] verifies that no orphaned ResolutionRequests remain in namespace after test completion - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:740 @ 04/19/26 14:24:31.157 (216ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:24:31.157&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:24:31.157 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when IntegrationTestScenario reference to task as pipelinerun resolution trigger pipelinerun for invalid integrationTestScenario by annotating snapshot and verify failing to create integration pipelinerun [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="25.812985389">
              <system-err>&gt; Enter [BeforeAll] when IntegrationTestScenario reference to task as pipelinerun resolution - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:775 @ 04/19/26 14:24:31.157&#xA;&lt; Exit [BeforeAll] when IntegrationTestScenario reference to task as pipelinerun resolution - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:775 @ 04/19/26 14:24:31.204 (46ms)&#xA;&gt; Enter [It] trigger pipelinerun for invalid integrationTestScenario by annotating snapshot and verify failing to create integration pipelinerun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:780 @ 04/19/26 14:24:31.204&#xA;&lt; Exit [It] trigger pipelinerun for invalid integrationTestScenario by annotating snapshot and verify failing to create integration pipelinerun - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:780 @ 04/19/26 14:24:51.27 (20.066s)&#xA;&gt; Enter [AfterAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:149 @ 04/19/26 14:24:51.27&#xA;&lt; Exit [AfterAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:149 @ 04/19/26 14:24:56.97 (5.7s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:24:56.97&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.Z3cR7n2baf/tests/integration-service/group-snapshots-tests.go:50 @ 04/19/26 14:24:56.97 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies if release CR is created [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies the release pipelinerun is running and succeeds [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies if the Release exists in github repo [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="100.155229731">
              <system-err>&gt; Enter [BeforeAll] component update with renovate - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:72 @ 04/19/26 13:50:24.269&#xA;ReleaseAdmissionPlan data: {&#34;Mapping&#34;:{&#34;Components&#34;:[{&#34;Name&#34;:&#34;gl-multi-component-parent-jxmg&#34;,&#34;Repository&#34;:&#34;quay.io/redhat-appstudio-qe/release-repository&#34;}]}}&#xA;&lt; Exit [BeforeAll] component update with renovate - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:72 @ 04/19/26 13:51:03.899 (39.63s)&#xA;&gt; Enter [It] creates component with nudges - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:235 @ 04/19/26 13:51:03.899&#xA;Image repository for component gl-multi-component-child-jxmg in namespace build-e2e-eqzd do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gl-multi-component-child-jxmg in namespace build-e2e-eqzd do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gl-multi-component-child-jxmg in namespace build-e2e-eqzd do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gl-multi-component-parent-jxmg in namespace build-e2e-eqzd do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates component with nudges - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:235 @ 04/19/26 13:52:04.424 (1m0.525s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 13:52:04.424&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 13:52:04.424 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="60.06310792">
              <system-err>&gt; Enter [It] triggers a PipelineRun for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:259 @ 04/19/26 13:52:04.424&#xA;PipelineRun has not been created yet for the component build-e2e-eqzd/gl-multi-component-parent-jxmg&#xA;PipelineRun has not been created yet for the component build-e2e-eqzd/gl-multi-component-parent-jxmg&#xA;PipelineRun has not been created yet for the component build-e2e-eqzd/gl-multi-component-parent-jxmg&#xA;&lt; Exit [It] triggers a PipelineRun for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:259 @ 04/19/26 13:53:04.487 (1m0.063s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 13:53:04.487&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 13:53:04.487 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="460.021952882">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:274 @ 04/19/26 13:53:04.488&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg found for Component build-e2e-eqzd/gl-multi-component-parent-jxmg&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-pull-request-jjrmg reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:274 @ 04/19/26 14:00:44.51 (7m40.022s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:00:44.51&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:00:44.51 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="132.782884195">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:285 @ 04/19/26 14:00:44.51&#xA;PipelineRun gl-multi-component-child-jxmg-on-pull-request-7779h found for Component build-e2e-eqzd/gl-multi-component-child-jxmg&#xA;PipelineRun gl-multi-component-child-jxmg-on-pull-request-7779h reason: Failed&#xA;attempt 1/3: PipelineRun &#34;gl-multi-component-child-jxmg-on-pull-request-7779h&#34; failed: &#xA; pod: gl-multi-component-child-jxmg-on-pull-request-7779h-init-pod | init container: prepare&#xA;2026/04/19 13:52:53 Entrypoint initialization&#xA;&#xA;pod: gl-multi-component-child-jxmg-on-pull-request-7779h-init-pod | container step-init: &#xA;time=&#34;2026-04-19T13:52:56Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-19T13:52:56Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-19T13:52:56Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-19T13:52:56Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-19T13:52:56Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-19T13:52:56Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-19T13:52:56Z&#34; level=info msg=&#34;Cache proxy is disabled in param or in backend&#34;&#xA;time=&#34;2026-04-19T13:52:56Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-19T13:52:56Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun gl-multi-component-child-jxmg-on-pull-request-rbt7p found after retrigger for component build-e2e-eqzd/gl-multi-component-child-jxmg&#xA;PipelineRun gl-multi-component-child-jxmg-on-pull-request-rbt7p found for Component build-e2e-eqzd/gl-multi-component-child-jxmg&#xA;PipelineRun gl-multi-component-child-jxmg-on-pull-request-rbt7p reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-child-jxmg-on-pull-request-rbt7p reason: Running&#xA;PipelineRun gl-multi-component-child-jxmg-on-pull-request-rbt7p reason: Running&#xA;PipelineRun gl-multi-component-child-jxmg-on-pull-request-rbt7p reason: Running&#xA;PipelineRun gl-multi-component-child-jxmg-on-pull-request-rbt7p reason: Running&#xA;PipelineRun gl-multi-component-child-jxmg-on-pull-request-rbt7p reason: Running&#xA;PipelineRun gl-multi-component-child-jxmg-on-pull-request-rbt7p reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:285 @ 04/19/26 14:02:57.293 (2m12.783s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:02:57.293&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:02:57.293 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="0.256611213">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for child component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:289 @ 04/19/26 14:02:57.294&#xA;&lt; Exit [It] should lead to a PaC PR creation for child component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:289 @ 04/19/26 14:02:57.55 (256ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:02:57.55&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:02:57.55 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="1.4230043">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:307 @ 04/19/26 14:02:57.551&#xA;merged result sha: 2994c14d75c981fbaf122fd89612ac520f863c73 for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:307 @ 04/19/26 14:02:58.973 (1.423s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:02:58.974&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:02:58.974 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="67.449646423">
              <system-err>&gt; Enter [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:318 @ 04/19/26 14:02:58.974&#xA;&lt; Exit [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:318 @ 04/19/26 14:04:06.423 (1m7.449s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:04:06.424&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:04:06.424 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="0.221053431">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:358 @ 04/19/26 14:04:06.424&#xA;&lt; Exit [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:358 @ 04/19/26 14:04:06.645 (221ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:04:06.645&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:04:06.645 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="1.557471176">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:375 @ 04/19/26 14:04:06.646&#xA;merged result sha: 8c9fe5180ccd55cd83e8717abf6e08237424c496 for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:375 @ 04/19/26 14:04:08.203 (1.557s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:04:08.203&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:04:08.203 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="20.028326408">
              <system-err>&gt; Enter [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:385 @ 04/19/26 14:04:08.204&#xA;Push PipelineRun has not been created yet for the component build-e2e-eqzd/gl-multi-component-parent-jxmg&#xA;&lt; Exit [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:385 @ 04/19/26 14:04:28.232 (20.028s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:04:28.232&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:04:28.232 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="160.018220179">
              <system-err>&gt; Enter [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:401 @ 04/19/26 14:04:28.232&#xA;PipelineRun gl-multi-component-parent-jxmg-on-push-l9vz9 found for Component build-e2e-eqzd/gl-multi-component-parent-jxmg&#xA;PipelineRun gl-multi-component-parent-jxmg-on-push-l9vz9 reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-push-l9vz9 reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-push-l9vz9 reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-push-l9vz9 reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-push-l9vz9 reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-push-l9vz9 reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-push-l9vz9 reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-push-l9vz9 reason: Running&#xA;PipelineRun gl-multi-component-parent-jxmg-on-push-l9vz9 reason: Completed&#xA;&lt; Exit [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:401 @ 04/19/26 14:07:08.25 (2m40.018s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:07:08.25&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:07:08.25 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="failed" time="1216.34236899">
              <failure message="Timed out after 1200.001s.&#xA;timed out when waiting for component nudge PR to be created in build-nudge-child-ntuagw repository&#xA;Expected&#xA;    &lt;bool&gt;: false&#xA;to be true" type="failed">[FAILED] Timed out after 1200.001s.&#xA;timed out when waiting for component nudge PR to be created in build-nudge-child-ntuagw repository&#xA;Expected&#xA;    &lt;bool&gt;: false&#xA;to be true&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:427 @ 04/19/26 14:27:08.252&#xA;</failure>
              <system-err>&gt; Enter [It] should lead to a nudge PR creation for child component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:412 @ 04/19/26 14:07:08.251&#xA;[FAILED] Timed out after 1200.001s.&#xA;timed out when waiting for component nudge PR to be created in build-nudge-child-ntuagw repository&#xA;Expected&#xA;    &lt;bool&gt;: false&#xA;to be true&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:427 @ 04/19/26 14:27:08.252&#xA;&lt; Exit [It] should lead to a nudge PR creation for child component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:412 @ 04/19/26 14:27:08.252 (20m0.001s)&#xA;&gt; Enter [AfterAll] component update with renovate - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:214 @ 04/19/26 14:27:08.252&#xA;&lt; Exit [AfterAll] component update with renovate - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:214 @ 04/19/26 14:27:24.321 (16.069s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:27:24.321&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:27:24.593 (272ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:429 @ 04/19/26 14:27:24.594&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:440 @ 04/19/26 14:27:24.594&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="89.470148195">
              <system-err>&gt; Enter [BeforeAll] component update with renovate - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:72 @ 04/19/26 13:50:24.269&#xA;ReleaseAdmissionPlan data: {&#34;Mapping&#34;:{&#34;Components&#34;:[{&#34;Name&#34;:&#34;gh-multi-component-parent-slac&#34;,&#34;Repository&#34;:&#34;quay.io/redhat-appstudio-qe/release-repository&#34;}]}}&#xA;&lt; Exit [BeforeAll] component update with renovate - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:72 @ 04/19/26 13:51:03.634 (39.365s)&#xA;&gt; Enter [It] creates component with nudges - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:235 @ 04/19/26 13:51:03.634&#xA;Image repository for component gh-multi-component-child-slac in namespace build-e2e-fyrv do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gh-multi-component-child-slac in namespace build-e2e-fyrv do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gh-multi-component-parent-slac in namespace build-e2e-fyrv do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gh-multi-component-parent-slac in namespace build-e2e-fyrv do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates component with nudges - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:235 @ 04/19/26 13:51:53.738 (50.104s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 13:51:53.738&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 13:51:53.739 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="60.071780415">
              <system-err>&gt; Enter [It] triggers a PipelineRun for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:259 @ 04/19/26 13:51:53.74&#xA;PipelineRun has not been created yet for the component build-e2e-fyrv/gh-multi-component-parent-slac&#xA;PipelineRun has not been created yet for the component build-e2e-fyrv/gh-multi-component-parent-slac&#xA;&lt; Exit [It] triggers a PipelineRun for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:259 @ 04/19/26 13:52:53.811 (1m0.071s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 13:52:53.811&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 13:52:53.811 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="590.811741217">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:274 @ 04/19/26 13:52:53.812&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v found for Component build-e2e-fyrv/gh-multi-component-parent-slac&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: PipelineRunStopping&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-vr85v reason: Failed&#xA;attempt 1/3: PipelineRun &#34;gh-multi-component-parent-slac-on-pull-request-vr85v&#34; failed: &#xA; pod: gh-multi-component-parent-slac-on-pull-request-vr85v-init-pod | init container: prepare&#xA;2026/04/19 13:52:47 Entrypoint initialization&#xA;&#xA;pod: gh-multi-component-parent-slac-on-pull-request-vr85v-init-pod | container step-init: &#xA;time=&#34;2026-04-19T13:52:50Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-19T13:52:50Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-19T13:52:50Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-19T13:52:50Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-19T13:52:50Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-19T13:52:50Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-19T13:52:50Z&#34; level=info msg=&#34;Cache proxy is disabled in param or in backend&#34;&#xA;time=&#34;2026-04-19T13:52:50Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-19T13:52:50Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun gh-multi-component-parent-slac-on-pull-request-h8sxt found after retrigger for component build-e2e-fyrv/gh-multi-component-parent-slac&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-h8sxt found for Component build-e2e-fyrv/gh-multi-component-parent-slac&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-h8sxt reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-h8sxt reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-h8sxt reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-h8sxt reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-h8sxt reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-h8sxt reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-pull-request-h8sxt reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:274 @ 04/19/26 14:02:44.623 (9m50.811s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:02:44.623&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:02:44.624 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="151.009075599">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:285 @ 04/19/26 14:02:44.624&#xA;PipelineRun gh-multi-component-child-slac-on-pull-request-qqff7 found for Component build-e2e-fyrv/gh-multi-component-child-slac&#xA;PipelineRun gh-multi-component-child-slac-on-pull-request-qqff7 reason: Failed&#xA;attempt 1/3: PipelineRun &#34;gh-multi-component-child-slac-on-pull-request-qqff7&#34; failed: &#xA; pod: gh-multi-component-child-slac-on-pull-request-qqff7-init-pod | init container: prepare&#xA;2026/04/19 13:52:19 Entrypoint initialization&#xA;&#xA;pod: gh-multi-component-child-slac-on-pull-request-qqff7-init-pod | container step-init: &#xA;time=&#34;2026-04-19T13:52:21Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-04-19T13:52:21Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-04-19T13:52:21Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-04-19T13:52:21Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-04-19T13:52:21Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-04-19T13:52:21Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-04-19T13:52:21Z&#34; level=info msg=&#34;Cache proxy is disabled in param or in backend&#34;&#xA;time=&#34;2026-04-19T13:52:21Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-04-19T13:52:21Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun gh-multi-component-child-slac-on-pull-request-m2sx9 found after retrigger for component build-e2e-fyrv/gh-multi-component-child-slac&#xA;PipelineRun gh-multi-component-child-slac-on-pull-request-m2sx9 found for Component build-e2e-fyrv/gh-multi-component-child-slac&#xA;PipelineRun gh-multi-component-child-slac-on-pull-request-m2sx9 reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-child-slac-on-pull-request-m2sx9 reason: Running&#xA;PipelineRun gh-multi-component-child-slac-on-pull-request-m2sx9 reason: Running&#xA;PipelineRun gh-multi-component-child-slac-on-pull-request-m2sx9 reason: Running&#xA;PipelineRun gh-multi-component-child-slac-on-pull-request-m2sx9 reason: Running&#xA;PipelineRun gh-multi-component-child-slac-on-pull-request-m2sx9 reason: Running&#xA;PipelineRun gh-multi-component-child-slac-on-pull-request-m2sx9 reason: Running&#xA;PipelineRun gh-multi-component-child-slac-on-pull-request-m2sx9 reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:285 @ 04/19/26 14:05:15.633 (2m31.009s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:05:15.633&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:05:15.633 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="0.207816733">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for child component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:289 @ 04/19/26 14:05:15.634&#xA;&lt; Exit [It] should lead to a PaC PR creation for child component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:289 @ 04/19/26 14:05:15.841 (208ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:05:15.841&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:05:15.841 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="1.488949118">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:307 @ 04/19/26 14:05:15.842&#xA;merged result sha: 83ed1fd685a4fdc18907b56dc5ef238726062a46 for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:307 @ 04/19/26 14:05:17.33 (1.488s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:05:17.331&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:05:17.331 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="4.617102593">
              <system-err>&gt; Enter [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:318 @ 04/19/26 14:05:17.332&#xA;&lt; Exit [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:318 @ 04/19/26 14:05:21.948 (4.617s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:05:21.948&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:05:21.948 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="0.153268116">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:358 @ 04/19/26 14:05:21.949&#xA;&lt; Exit [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:358 @ 04/19/26 14:05:22.102 (153ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:05:22.102&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:05:22.102 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="1.541092">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:375 @ 04/19/26 14:05:22.103&#xA;merged result sha: d22ac246d67329717e25989a910df24172f98baa for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:375 @ 04/19/26 14:05:23.643 (1.541s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:05:23.644&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:05:23.644 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="20.041954733">
              <system-err>&gt; Enter [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:385 @ 04/19/26 14:05:23.644&#xA;Push PipelineRun has not been created yet for the component build-e2e-fyrv/gh-multi-component-parent-slac&#xA;&lt; Exit [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:385 @ 04/19/26 14:05:43.686 (20.042s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:05:43.686&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:05:43.686 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="120.014730742">
              <system-err>&gt; Enter [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:401 @ 04/19/26 14:05:43.686&#xA;PipelineRun gh-multi-component-parent-slac-on-push-jsvcq found for Component build-e2e-fyrv/gh-multi-component-parent-slac&#xA;PipelineRun gh-multi-component-parent-slac-on-push-jsvcq reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-slac-on-push-jsvcq reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-push-jsvcq reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-push-jsvcq reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-push-jsvcq reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-push-jsvcq reason: Running&#xA;PipelineRun gh-multi-component-parent-slac-on-push-jsvcq reason: Completed&#xA;&lt; Exit [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:401 @ 04/19/26 14:07:43.701 (2m0.014s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:07:43.701&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:07:43.701 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="failed" time="1216.319712929">
              <failure message="Timed out after 1200.001s.&#xA;timed out when waiting for component nudge PR to be created in build-nudge-child-eyrrdk repository&#xA;Expected&#xA;    &lt;bool&gt;: false&#xA;to be true" type="failed">[FAILED] Timed out after 1200.001s.&#xA;timed out when waiting for component nudge PR to be created in build-nudge-child-eyrrdk repository&#xA;Expected&#xA;    &lt;bool&gt;: false&#xA;to be true&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:427 @ 04/19/26 14:27:43.703&#xA;</failure>
              <system-err>&gt; Enter [It] should lead to a nudge PR creation for child component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:412 @ 04/19/26 14:07:43.702&#xA;[FAILED] Timed out after 1200.001s.&#xA;timed out when waiting for component nudge PR to be created in build-nudge-child-eyrrdk repository&#xA;Expected&#xA;    &lt;bool&gt;: false&#xA;to be true&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:427 @ 04/19/26 14:27:43.703&#xA;&lt; Exit [It] should lead to a nudge PR creation for child component  - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:412 @ 04/19/26 14:27:43.703 (20m0.001s)&#xA;&gt; Enter [AfterAll] component update with renovate - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:214 @ 04/19/26 14:27:43.703&#xA;&lt; Exit [AfterAll] component update with renovate - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:214 @ 04/19/26 14:27:59.755 (16.052s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:27:59.755&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:28 @ 04/19/26 14:28:00.021 (266ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:429 @ 04/19/26 14:28:00.022&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.Z3cR7n2baf/tests/build/renovate.go:440 @ 04/19/26 14:28:00.022&#xA;</system-err>
          </testcase>
      </testsuite>
  </testsuites>